Goby/json/Microsoft-Exchange-XSS-(CVE...

146 lines
5.3 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "Microsoft Exchange XSS (CVE-2021-41349)",
"Description": "<p>Microsoft Exchange Server is a set of e-mail service programs of Microsoft Corporation. It provides mail access, storage, forwarding, voice mail, mail filtering and other functions.</p><p>Attackers can use xss vulnerabilities to obtain sensitive information such as users' cookies to further control the system.</p>",
"Product": "Exchange",
"Homepage": "https://msrc.microsoft.com/",
"DisclosureDate": "2021-11-15",
"Author": "1291904552@qq.com",
"FofaQuery": "app=\"Microsoft-Exchange\"",
"GobyQuery": "app=\"Microsoft-Exchange\"",
"Level": "1",
"Impact": "<p>Attackers can use xss vulnerabilities to obtain sensitive information such as users' cookies to further control the system.</p>",
"Translation": {
"CN": {
"Name": "Microsoft Exchange 跨站脚本漏洞CVE-2021-41349",
"VulType": [
"XSS漏洞"
],
"Tags": [
"XSS漏洞"
],
"Description": "<p>Microsoft Exchange Server是美国微软Microsoft公司的一套电子邮件服务程序。它提供邮件存取、储存、转发语音邮件邮件过滤筛选等功能。</p><p>攻击者可使用xss漏洞获取用户的cookie等敏感信息进一步控制系统。</p>",
"Impact": "<p>攻击者可使用xss漏洞获取用户的cookie等敏感信息进一步控制系统。</p>",
"Product": "Exchange",
"Recommendation": "<p>⼚商已发布了漏洞修复程序,请及时关注更新: <a href=\"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41349\">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41349</a></p><p>1、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p><p>2、升级Apache系统版本。</p>"
},
"EN": {
"Name": "Microsoft Exchange XSS (CVE-2021-41349)",
"VulType": [
"xss"
],
"Tags": [
"xss"
],
"Description": "<p>Microsoft Exchange Server is a set of e-mail service programs of Microsoft Corporation. It provides mail access, storage, forwarding, voice mail, mail filtering and other functions.</p><p>Attackers can use xss vulnerabilities to obtain sensitive information such as users' cookies to further control the system.</p>",
"Impact": "<p>Attackers can use xss vulnerabilities to obtain sensitive information such as users' cookies to further control the system.</p>",
"Product": "Exchange",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41349\">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41349</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.Upgrade the Apache system version.</p>"
}
},
"References": [
"https://github.com/projectdiscovery/nuclei-templates/blob/master/cves/2021/CVE-2021-41349.yaml"
],
"HasExp": true,
"ExpParams": [
{
"name": "script",
"type": "input",
"value": "alert(document.domain)"
}
],
"ExpTips": null,
"ScanSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/test.php",
"follow_redirect": true,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "test",
"bz": ""
}
]
},
"SetVariable": []
}
],
"ExploitSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/test.php",
"follow_redirect": true,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "test",
"bz": ""
}
]
},
"SetVariable": []
}
],
"Tags": [
"xss"
],
"VulType": [
"xss"
],
"CVEIDs": [
"CVE-2021-41349"
],
"CVSSScore": "6.5",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": [
"Exchange"
],
"System": null,
"Hardware": null
},
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41349\">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41349</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2. Upgrade the Apache system version.</p>",
"CNNVD": [
"CNNVD-202111-816"
],
"CNVD": [
""
]
}