diff --git a/vulnerabilities/other/gnuboard-sms-xss.yaml b/vulnerabilities/other/gnuboard-sms-xss.yaml new file mode 100644 index 0000000000..155dea7f7d --- /dev/null +++ b/vulnerabilities/other/gnuboard-sms-xss.yaml @@ -0,0 +1,35 @@ +id: gnuboard-sms-xss + +info: + name: Gnuboard CMS - SMS Emoticon XSS + author: gy741 + severity: medium + description: A vulnerability in Gnuboard CMS allows remote attackers to inject arbitrary Javascript into the responses returned by the server. + reference: + - https://sir.kr/g5_pds/4788?page=5 + - https://github.com/gnuboard/gnuboard5/commit/8182cac90d2ee2f9da06469ecba759170e782ee3 + metadata: + verified: true + shodan-query: http.html:"Gnuboard" + tags: xss,gnuboard + +requests: + - method: GET + path: + - "{{BaseURL}}/plugin/sms5/ajax.sms_emoticon.php?arr_ajax_msg=gnuboard" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '"0nuboard"' + + - type: word + part: header + words: + - "text/html" + + - type: status + status: + - 200