Skip to content

Instantly share code, notes, and snippets.

@harsh-bothra
Last active October 29, 2020 12:22
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save harsh-bothra/f4285d20a7718d2e1934c042b04d9fac to your computer and use it in GitHub Desktop.
Save harsh-bothra/f4285d20a7718d2e1934c042b04d9fac to your computer and use it in GitHub Desktop.
Cross-Site Scripting in NeDi 1.9C
Product: NeDi - Find IT
CVE: Use CVE-2020-23868
Version: 1.9C
Vulnerability: Reflected Cross-Site Scripting
Vulnerability Description: NeDi 1.9C allows Cross-Site Scripting via "d" parameter at "inc/rt-popup.ph" page.
# Steps to Reproduce
1. Log in to the application with provided credentials.
2. Navigate to "https://<nedi_server_ip>/inc/rt-popup.php" page.
3. Add "d" parameter at the end of the URL with XSS Payload like below:
> https://<nedi_server_ip>/inc/rt-popup.php?d=<img src=1 onerror=alert(document.domain)>
4. Observe that the XSS Payload provided in Step-3 is executed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment