Cross-site Scripting (XSS) vulnerability in the 'notes' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7354, which describes a similar issue, but involving the generated 'host' field of a discovered scan asset.
References
Link | Resource |
---|---|
https://avalz.it/research/metasploit-pro-xss-to-rce/ | Exploit Third Party Advisory |
https://help.rapid7.com/metasploit/release-notes/archive/2020/05/#20200514 | Release Notes Vendor Advisory |
https://avalz.it/research/metasploit-pro-xss-to-rce/ | Exploit Third Party Advisory |
https://help.rapid7.com/metasploit/release-notes/archive/2020/05/#20200514 | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://avalz.it/research/metasploit-pro-xss-to-rce/ - Exploit, Third Party Advisory | |
References | () https://help.rapid7.com/metasploit/release-notes/archive/2020/05/#20200514 - Release Notes, Vendor Advisory |
Information
Published : 2020-06-25 18:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7355
Mitre link : CVE-2020-7355
CVE.ORG link : CVE-2020-7355
JSON object : View
Products Affected
rapid7
- metasploit
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')