66 lines
2.3 KiB
YAML
66 lines
2.3 KiB
YAML
id: CVE-2020-9496
|
|
|
|
info:
|
|
name: Apache OFBiz 17.12.03 - Cross-Site Scripting
|
|
author: dwisiswant0
|
|
severity: medium
|
|
description: Apache OFBiz 17.12.03 contains cross-site scripting and unsafe deserialization vulnerabilities via an XML-RPC request.
|
|
impact: |
|
|
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
|
|
remediation: |
|
|
Apply the latest security patches or upgrade to a non-vulnerable version of Apache OFBiz.
|
|
reference:
|
|
- http://packetstormsecurity.com/files/158887/Apache-OFBiz-XML-RPC-Java-Deserialization.html
|
|
- http://packetstormsecurity.com/files/161769/Apache-OFBiz-XML-RPC-Java-Deserialization.html
|
|
- https://securitylab.github.com/advisories/GHSL-2020-069-apache_ofbiz
|
|
- https://s.apache.org/l0994
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2020-9496
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
|
cvss-score: 6.1
|
|
cve-id: CVE-2020-9496
|
|
cwe-id: CWE-502
|
|
epss-score: 0.89561
|
|
epss-percentile: 0.98689
|
|
cpe: cpe:2.3:a:apache:ofbiz:17.12.03:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: apache
|
|
product: ofbiz
|
|
shodan-query:
|
|
- http.html:"ofbiz"
|
|
- ofbiz.visitor=
|
|
fofa-query:
|
|
- body="ofbiz"
|
|
- app="apache_ofbiz"
|
|
tags: cve,cve2020,ofbiz,packetstorm,apache,java
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /webtools/control/xmlrpc HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Origin: http://{{Hostname}}
|
|
Content-Type: application/xml
|
|
|
|
<?xml version="1.0"?><methodCall><methodName>ProjectDiscovery</methodName><params><param><value>dwisiswant0</value></param></params></methodCall>
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "faultString"
|
|
- "No such service [ProjectDiscovery]"
|
|
- "methodResponse"
|
|
condition: and
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- "Content-Type: text/xml"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4a0a00473045022100c9e4cbbbf460e2cdc9e694471064bc5eea2702ed1ba888d53fbe7d39c34d319802204c0abc5eaf59fd7e3d442c0eea055c44b417aa0d4c7977923195dd4e940ddd30:922c64590222798bb761d5b6d8e72950 |