From f199b830e2b8ddfb0df9509c8b4046a60ae594bc Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Thu, 1 Sep 2022 12:56:16 +0530 Subject: [PATCH] Update CVE-2021-46068.yaml --- cves/2021/CVE-2021-46068.yaml | 35 ++++++++++++++++------------------- 1 file changed, 16 insertions(+), 19 deletions(-) diff --git a/cves/2021/CVE-2021-46068.yaml b/cves/2021/CVE-2021-46068.yaml index d5a626c175..801043edbf 100644 --- a/cves/2021/CVE-2021-46068.yaml +++ b/cves/2021/CVE-2021-46068.yaml @@ -1,25 +1,21 @@ id: CVE-2021-46068 + info: - name: Vehicle Service Management System - "My Account" Stored Cross Site Scripting (XSS) + name: Vehicle Service Management System - Stored Cross Site Scripting author: TenBird - severity: Medium - description: A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel. + severity: medium + description: | + A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel. reference: + - https://github.com/plsanu/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS + - https://www.plsanu.com/vehicle-service-management-system-myaccount-stored-cross-site-scripting-xss - https://nvd.nist.gov/vuln/detail/CVE-2021-46068 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N - cvss-score: 4.8 cve-id: CVE-2021-46068 - cwe-id: CWE-79 - tags: cve,cve2021,Stored XSS,Cross-Site-Script + tags: cve,cve2021,xss,vms,authenticated requests: - raw: - - - | - GET /vehicle_service/admin/login.php HTTP/1.1 - Host: {{Hostname}} - - | POST /vehicle_service/classes/Login.php?f=login HTTP/1.1 Host: {{Hostname}} @@ -38,14 +34,15 @@ requests: GET /vehicle_service/admin/?page=user HTTP/1.1 Host: {{Hostname}} + req-condition: true redirects: true + max-redirects: 2 cookie-reuse: true matchers-condition: and matchers: - - type: status - status: - - 200 - - type: word - part: body - words: - - '">' \ No newline at end of file + - type: dsl + dsl: + - "contains(all_headers_3, 'text/html')" + - "status_code_3 == 200" + - 'contains(body_3, "Adminstrator\"> Admin")' + condition: and