From ddf8cc65270c2adca3064839940e7b526e814a90 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Thu, 1 Sep 2022 13:07:46 +0530 Subject: [PATCH] Update CVE-2021-46073.yaml --- cves/2021/CVE-2021-46073.yaml | 40 +++++++++++++++++------------------ 1 file changed, 20 insertions(+), 20 deletions(-) diff --git a/cves/2021/CVE-2021-46073.yaml b/cves/2021/CVE-2021-46073.yaml index 2b541329c5..a3a483161a 100644 --- a/cves/2021/CVE-2021-46073.yaml +++ b/cves/2021/CVE-2021-46073.yaml @@ -1,25 +1,24 @@ id: CVE-2021-46073 + info: - name: Vehicle Service Management System - 'User List' Stored Cross Site Scripting (XSS) + name: Vehicle Service Management System - Cross Site Scripting author: TenBird - severity: Medium - description: A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the User List Section in login panel. + severity: medium + description: | + A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the User List Section in login panel. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2021-46068 + - https://github.com/plsanu/Vehicle-Service-Management-System-User-List-Stored-Cross-Site-Scripting-XSS + - https://www.plsanu.com/vehicle-service-management-system-user-list-stored-cross-site-scripting-xss + - https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html + - https://nvd.nist.gov/vuln/detail/CVE-2021-46073 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N - cvss-score: 4.8 cve-id: CVE-2021-46073 - cwe-id: CWE-79 - tags: cve,cve2021,Stored XSS,Cross-Site-Script + metadata: + verified: true + tags: cve,cve2021,xss,vms,authenticated requests: - raw: - - - | - GET /vehicle_service/admin/login.php HTTP/1.1 - Host: {{Hostname}} - - | POST /vehicle_service/classes/Login.php?f=login HTTP/1.1 Host: {{Hostname}} @@ -38,14 +37,15 @@ requests: GET /vehicle_service/admin/?page=user/list HTTP/1.1 Host: {{Hostname}} + req-condition: true redirects: true + max-redirects: 2 cookie-reuse: true matchers-condition: and matchers: - - type: status - status: - - 200 - - type: word - part: body - words: - - '">' \ No newline at end of file + - type: dsl + dsl: + - "contains(all_headers_3, 'text/html')" + - "status_code_3 == 200" + - 'contains(body_3, " Test")' + condition: and