diff --git a/http/cves/2023/CVE-2023-27641.yaml b/http/cves/2023/CVE-2023-27641.yaml new file mode 100644 index 0000000000..1f2791e33e --- /dev/null +++ b/http/cves/2023/CVE-2023-27641.yaml @@ -0,0 +1,53 @@ +id: CVE-2023-27641 + +info: + name: L-Soft LISTSERV 16.5 - Cross-Site Scripting + author: ritikchaddha + severity: medium + description: | + The REPORT (after z but before a) parameter in wa.exe in L-Soft LISTSERV 16.5 before 17 allows an attacker to conduct XSS attacks via a crafted URL. + impact: | + Successful exploitation could lead to unauthorized access or data theft. + remediation: | + Update to the latest version of L-Soft LISTSERV to mitigate the XSS vulnerability. + reference: + - https://github.com/hosakauk/exploits/blob/master/listserv_report_xss.MD + - https://nvd.nist.gov/vuln/detail/CVE-2023-27641 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2023-27641 + cwe-id: CWE-79 + epss-score: 0.00068 + epss-percentile: 0.28723 + cpe: cpe:2.3:a:lsoft:listserv:*:*:*:*:*:*:*:* + metadata: + vendor: lsoft + product: listserv + shodan-query: http.html:"LISTSERV" + fofa-query: body="listserv" + tags: cve2023,cve,xss,listserv,edb,lsoft + +http: + - method: GET + path: + - '{{BaseURL}}/wa.exe?REPORT&z=4&">a=1' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '>' + - 'LISTSERV' + case-insensitive: true + condition: and + + - type: word + part: content_type + words: + - text/html + + - type: status + status: + - 200