Skip to content
This repository has been archived by the owner on Apr 3, 2024. It is now read-only.

CVE-2020-23451 - has been added to the list #7

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

abuyv
Copy link

@abuyv abuyv commented Apr 10, 2023

As a author of added CVE, wanted contributing to this project. So, could you please check and validate the CVE I have appended?

As a author of added CVE, wanted contributing to this project. So, could you please check and validate the CVE I have appended?
@mehaase
Copy link
Contributor

mehaase commented Apr 10, 2023

Congratulations on the CVE and thank you for submitting this mapping to our project! Can you provide more details about the CVE so that we can confirm the mappings to ATT&CK? The domain abuyv.com is not working for me.

@abuyv
Copy link
Author

abuyv commented Apr 10, 2023

Thanks @mehaase getting back to me, wanted to start with a simple CVE to see if I understood the mapping method correctly then could switch to the complex CVEs.

Its just a basic CSRF vulnerability and POC can be found on the link below:
https://abuyv.github.io/com/cve/spiceworks-csrf-via-xss

Overall, you need to have a valid credential on the target system then from there you can target and force an admin user to change your privilege to the higher level.

@mehaase
Copy link
Contributor

mehaase commented Apr 12, 2023

Thank you for the detailed reference. Per the CVE mapping methodology:

For example, the cross-site scripting (XSS) vulnerability type includes an option of T1189 (Drive-by Compromise) or T1204.001 (User Execution: Malicious Link) depending on whether the attacked is stored or not.

Therefore, I recommend changing the exploitation technique to T1189 Drive-by Compromise, because admin users will trigger this XSS in the course of normal work and the attacker does not need to socially engineer them.

Exploitation Technique been updated for CVE-2020-23451
@abuyv
Copy link
Author

abuyv commented May 1, 2023

True, I agree and modified the exploitation technique to the correct one now.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants