Fix: False Positives in CVE-2021-37833 (HotelDruid Fingerprint)#15597
Merged
DhiyaneshGeek merged 4 commits intoprojectdiscovery:mainfrom Mar 16, 2026
Merged
Fix: False Positives in CVE-2021-37833 (HotelDruid Fingerprint)#15597DhiyaneshGeek merged 4 commits intoprojectdiscovery:mainfrom
DhiyaneshGeek merged 4 commits intoprojectdiscovery:mainfrom
Conversation
Neo - Nuclei Template ReviewNo security issues found Highlights
Hardening Notes
Comment |
DhiyaneshGeek
approved these changes
Mar 16, 2026
Removed outdated references from CVE-2021-37833.yaml
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
PR Information
This PR updates the
CVE-2021-37833(Hotel Druid 3.0.2 - Cross-Site Scripting) nuclei template to address False Positive issues encountered during enterprise vulnerability scanning.Motivation:
During routine scanning of internal corporate assets, we observed that the previous version of this template triggered False Positives against generic web endpoints, custom SSO error portals, and proxy default pages that blindly echo/reflect user input appended to the URI. Because the previous template solely relied on detecting the payload string (
</script><script>alert(document.domain)</script>) alongside a200 OKstatus and atext/htmlheader, these generic HTML reflections incorrectly triggered medium-severity XSS alerts, even when the asset was completely unrelated to HotelDruid.Solution Introduced:
To improve the fidelity of the template and eliminate false positive findings on generic corporate assets, a Product Fingerprinting matcher has been introduced.
By ensuring the
hoteldruidtechnology signature is explicitly identified within the response body footprint (which is always present in legitimate HotelDruid installations through its<title>, copyright notices, and stylesheet links), this change successfully avoids false positives caused by blind reflection on unrelated applications, while preventing any false negatives against legitimately vulnerable instances.http/cves/2021/CVE-2021-37833.yamlTemplate validation
Additional Details
Prior to this update, a typical reflection scenario causing a False Positive looked like this:
GET /visualizza_tabelle.php?a...%3C%2Fscript%3E%3C... HTTP/1.1Host: [REDACTED]HTTP/1.1 200 OKServer: nginxContent-Type: text/html...<input value="[REDACTED_INTERNAL_PATH]/?wo03b</script><script>alert(document.domain)</script>=" name="redirect_url" type="hidden">...As observed above, the payload is blindly reflected back inside a hidden input field of a completely different internal portal application following a parameter blind reflection. Since the word "hoteldruid" is entirely missing from the response body, the updated template successfully ignores this unrelated endpoint.
Debugging & Validation Flow:
None of the prerequisites are obligatory; they are merely intended to speed the review process.
Additional References: