Cross-site Scripting (XSS) vulnerability in the 'host' field of a discovered scan asset in Rapid7 Metasploit Pro allows an attacker with a specially-crafted network service of a scan target to store an XSS sequence in the Metasploit Pro console, which will trigger when the operator views the record of that scanned host in the Metasploit Pro interface. This issue affects Rapid7 Metasploit Pro version 4.17.1-20200427 and prior versions, and is fixed in Metasploit Pro version 4.17.1-20200514. See also CVE-2020-7355, which describes a similar issue, but involving the generated 'notes' field of a discovered scan asset.
References
Link | Resource |
---|---|
https://help.rapid7.com/metasploit/release-notes/archive/2020/05/#20200514 | Release Notes Vendor Advisory |
https://avalz.it/research/metasploit-pro-xss-to-rce/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-06-25 11:15
Updated : 2020-07-02 07:16
NVD link : CVE-2020-7354
Mitre link : CVE-2020-7354
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
rapid7
- metasploit