Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-14413 PoC — NeDi Consulting NeDi 跨站脚本漏洞

Source
Associated Vulnerability
Title:NeDi Consulting NeDi 跨站脚本漏洞 (CVE-2020-14413)
Description:NeDi Consulting NeDi是瑞士NeDi Consulting公司的一套支持发现和映射网络设备的开源软件。 NeDi Consulting NeDi 1.9C版本中的inc/libmisc.php文件的‘sanitize()’函数存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Description
NeDi 1.9C is vulnerable to cross-site scripting because of an incorrect implementation of sanitize() in inc/libmisc.php. This function attempts to escape the SCRIPT tag from user-controllable values, but can be easily bypassed, as demonstrated by an onerror attribute of an IMG element as a Devices-Config.php?sta= value.
File Snapshot

id: CVE-2020-14413 info: name: NeDi 1.9C - Cross-Site Scripting author: pikpikcu severity: me ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.