nuclei-templates/http/cves/2020/CVE-2020-9496.yaml

60 lines
2.2 KiB
YAML
Raw Normal View History

2021-01-02 04:56:15 +00:00
id: CVE-2020-9496
2020-08-16 00:52:06 +00:00
info:
name: Apache OFBiz 17.12.03 - Cross-Site Scripting
2020-08-16 00:52:06 +00:00
author: dwisiswant0
severity: medium
description: Apache OFBiz 17.12.03 contains cross-site scripting and unsafe deserialization vulnerabilities via an XML-RPC request.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:22:36 +00:00
remediation: |
Apply the latest security patches or upgrade to a non-vulnerable version of Apache OFBiz.
2021-03-15 17:14:52 +00:00
reference:
- http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html
- http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html
- https://securitylab.github.com/advisories/GHSL-2020-069-apache_ofbiz
- https://s.apache.org/l0994
- https://nvd.nist.gov/vuln/detail/CVE-2020-9496
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2020-9496
2023-07-11 19:49:27 +00:00
cwe-id: CWE-502
epss-score: 0.97338
epss-percentile: 0.99865
2023-09-06 12:22:36 +00:00
cpe: cpe:2.3:a:apache:ofbiz:17.12.03:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: apache
product: ofbiz
tags: ofbiz,packetstorm,cve,cve2020,apache,java
2020-08-16 00:52:06 +00:00
http:
2020-08-16 00:52:06 +00:00
- raw:
- |
POST /webtools/control/xmlrpc HTTP/1.1
Host: {{Hostname}}
Origin: http://{{Hostname}}
Content-Type: application/xml
<?xml version="1.0"?><methodCall><methodName>ProjectDiscovery</methodName><params><param><value>dwisiswant0</value></param></params></methodCall>
2020-08-16 00:52:06 +00:00
matchers-condition: and
matchers:
- type: word
2023-07-11 19:49:27 +00:00
part: body
2020-08-16 00:52:06 +00:00
words:
- "faultString"
- "No such service [ProjectDiscovery]"
- "methodResponse"
condition: and
2023-07-11 19:49:27 +00:00
2020-08-16 00:52:06 +00:00
- type: word
2023-07-11 19:49:27 +00:00
part: header
2020-08-16 00:52:06 +00:00
words:
- "Content-Type: text/xml"
2023-07-11 19:49:27 +00:00
2020-08-16 00:52:06 +00:00
- type: status
status:
2020-08-25 22:52:00 +00:00
- 200
# digest: 4b0a00483046022100cf87403489d89693fa1f8ab15a2bd11ff388040fdbe008907168879db0a14930022100addec9d345716fd830b2ffc0dd249adfa37b46f0d66af51244abedfb95faf899:922c64590222798bb761d5b6d8e72950