漏洞信息
漏洞名称: krpano Panorama Viewer Reflected XSS Vulnerability
漏洞编号:
漏洞类型: 跨站可执行脚本
漏洞等级: 中危
漏洞描述: krpano Panorama Viewer是一款用于展示全景图像的软件,广泛应用于旅游、房地产等行业,提供沉浸式的视觉体验。该软件的1.20.8及之前版本存在反射型跨站脚本(XSS)漏洞。漏洞的根源在于krpano.html页面未能对加载的远程XML/JS文件中的恶意查询参数进行适当的输入验证和过滤,导致攻击者能够注入恶意脚本。攻击者可以利用此漏洞在用户的浏览器中执行任意JavaScript代码,可能导致会话劫持、钓鱼攻击或其他恶意操作。由于此漏洞需要通过用户交互(如点击恶意链接)来触发,因此其利用复杂度相对较高。然而,一旦成功利用,攻击者可以完全控制受影响用户的会话,对用户数据安全构成严重威胁。
产品厂商: krpano
产品名称: panorama_viewer
影响版本: <= 1.20.8
来源: https://github.com/projectdiscovery/nuclei-templates/blob/5fdc5657c6bfbf67102a9f8dd85638cc8776c20d/http%2Fcves%2F2020%2FCVE-2020-24900.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43
| id: CVE-2020-24900
info: name: krpano Panorama Viewer - Reflected XSS author: oways severity: medium description: | krpano Panorama Viewer <= 1.20.8 is vulnerable to reflected XSS via maliciously crafted query parameters loading remote XML/JS in krpano.html. reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-24900 - https://packetstorm.news/files/id/159477/ classification: cve-id: CVE-2020-24900 cwe-id: CWE-79 metadata: vendor: krpano product: panorama_viewer tags: cve,cve2020,xss,krpano,viewer
requests: - method: GET path: - "{{BaseURL}}" matchers: - type: word part: body words: - "embedpano({swf:" - method: GET path: - "{{BaseURL}}/?xml=oways.xml" matchers-condition: and matchers: - type: word part: body words: - "FATAL ERROR:<br>oways.xml - loading failed! (404)"
|