Giter Club home page Giter Club logo

netbox's Introduction

Hi there👋, I'm Alex! (known as anhdq201)

Coding


What I'm doing:

  • 🌁 I’m currently studying in KMA (Academy of cryptography techniques - Viet Nam)

  • 🌱 I’m currently learning: WebSec and Pentest Web!

  • 📫 How to reach me: @anhdq201

  • ⚡ What I like to do: I like so much music, football...and coding of course


Languages and Tools:

nodejs python javascript java mysql linux linux


netbox's People

Contributors

anhdq201 avatar

Stargazers

 avatar

Watchers

 avatar  avatar

netbox's Issues

Stored Cross Site Scripting Vulnerability in "Create Power Panels" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Power Panels" function in the "Power" feature.

Proof of Concept

Step 1: Go to /dcim/power-panels/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Go to /dcim/power-feeds/, click "Add" and select "Power panel"

image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Stored Cross Site Scripting Vulnerability in "Create Contacts" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Contacts" function in the "Organization" feature.

Proof of Concept

Step 1: Go to /tenancy/contacts/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Go to /tenancy/contact-assignments/, Select one element and click "Edit Selected", after select "Contact"

image
image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Stored Cross Site Scripting Vulnerability in "Create Rack Roles" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Rack Roles" function in the "Organization" feature.

Proof of Concept

Step 1: Go to /dcim/rack-roles/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Go to /dcim/racks/, click "Add" and select "Role"

image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Stored Cross Site Scripting Vulnerability in "Create Sites" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Sites" function in the "Organization" feature.

Proof of Concept

Step 1: Go to /dcim/sites/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Go to /dcim/racks/, click "Add" and select "Site"

image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Stored Cross Site Scripting Vulnerability in "Create Tenant Groups" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Tenant Groups" function in the "Organization" feature.

Proof of Concept

Step 1: Go to /tenancy/tenant-groups/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Go to /dcim/sites/, click "Add" and select "Tenant group"

image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Unauthentication GraphQL Database Query Vulnerability in "Create Contacts" function in Netbox 3.5.1

Version: 3.5.1

Description

Unauthentication GraphQL Database Query refers to a vulnerability where unauthorized individuals can execute queries against a GraphQL database without proper authentication. This means that anyone, without providing valid credentials, can access and manipulate sensitive data stored in the database.

Proof of Concept

Step 1: Go to /graphql/, insert payload GraphQL Database Query without authentication

image

Impact

The impact of an unauthenticated GraphQL database query includes unauthorized access to sensitive data, data manipulation or deletion, compromised data integrity, system unavailability, and damage to an organization's reputation.

Stored Cross Site Scripting Vulnerability in "Create Locations" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Locations" function in the "Organization" feature.

Proof of Concept

Step 1: Go to /dcim/locations/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Go to /dcim/racks/, click "Add" and select "Location"

image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Stored Cross Site Scripting Vulnerability in "Create Circuit Types" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Circuit Types" function in the "Circuits" feature.

Proof of Concept

Step 1: Go to /circuits/circuit-types/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Go to /circuits/circuits/, click "Add" and select "Type"

image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Stored Cross Site Scripting Vulnerability in "Create Provider Accounts" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Provider Accounts" function in the "Circuits" feature.

Proof of Concept

Step 1: Go to /circuits/provider-accounts/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Account ID" field.

image

Step 2: Go to /circuits/circuits/, click "Add" and select "Provider account"

image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Stored Cross Site Scripting Vulnerability in "Create Regions" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Regions" function in the "Organization" feature.

Proof of Concept

Step 1: Go to /dcim/regions/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Go to /dcim/sites/, click "Add" and select "Region"

image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Stored Cross Site Scripting Vulnerability in "Create Contact Groups" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Contact Groups" function in the "Organization" feature.

Proof of Concept

Step 1: Go to /tenancy/contact-groups/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Go to /tenancy/contacts/, click "Add" and select "Group"

image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Stored Cross Site Scripting Vulnerability in "Create Site Groups" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Site Groups" function in the "Organization" feature.

Proof of Concept

Step 1: Go to /dcim/site-groups/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Go to /dcim/sites/, click "Add" and select "Group"

image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Stored Cross Site Scripting Vulnerability in "Create Rack" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Rack" function in the "Organization" feature.

Proof of Concept

Step 1: Go to /dcim/rack/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Go to /dcim/rack-reservations/, click "Add" and select "Rack"

image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Stored Cross Site Scripting Vulnerability in "Create Tenants" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Tenants" function in the "Organization" feature.

Proof of Concept

Step 1: Go to /tenancy/tenants/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Go to /dcim/sites/, click "Add" and select "Tenant"

image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Stored Cross Site Scripting Vulnerability in "Create Providers" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Providers" function in the "Circuits" feature.

Proof of Concept

Step 1: Go to /circuits/providers/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Go to /circuits/provider-accounts/, click "Add" and select "Provider"

image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Stored Cross Site Scripting Vulnerability in "Create Contact Roles" function in Netbox 3.5.1

Version: 3.5.1

Description

An authenticated malicious user can take advantage of a Stored XSS vulnerability in "Create Contacts" function in the "Organization" feature.

Proof of Concept

Step 1: Go to /tenancy/contact-roles/, click "Add" and insert payload "<img src=1 onerror='alert(document.cookie)'/>" in "Name" field.

image

Step 2: Go to /tenancy/contact-assignments/, Select one element and click "Edit Selected", after select "Role"

image
image

**Step 3: Script excuted

image

Impact

If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.