CVE-2023-1362: unilogies/bumsys < v2.0.2 - Clickjacking

日期: 2025-08-01 | 影响软件: unilogies bumsys | POC: 已公开

漏洞描述

This template checks for the presence of clickjacking prevention headers in the HTTP response, aiming to identify vulnerabilities related to the improper restriction of rendered UI layers or frames in the GitHub repository unilogies/bumsys prior to version 2.0.2.

PoC代码[已公开]

id: CVE-2023-1362

info:
  name: unilogies/bumsys < v2.0.2 - Clickjacking
  author: ctflearner
  severity: medium
  description: |
    This template checks for the presence of clickjacking prevention headers in the HTTP response, aiming to identify vulnerabilities related to the improper restriction of rendered UI layers or frames in the GitHub repository unilogies/bumsys prior to version 2.0.2.
  impact: |
    An attacker can trick users into performing unintended actions on the vulnerable application.
  remediation: |
    Upgrade to version 2.0.2 or later to mitigate the Clickjacking vulnerability.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2023-1362
    - https://huntr.dev/bounties/e5959166-c8ef-4ada-9bb1-0ff5a9693bac/
    - https://github.com/unilogies/bumsys/commit/8c5b27d54707f9805b27ef26ad741f2801e30e1f
    - https://github.com/ctflearner/ctflearner
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2023-1362
    cwe-id: CWE-1021
    epss-score: 0.27774
    epss-percentile: 0.96162
    cpe: cpe:2.3:a:bumsys_project:bumsys:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: bumsys_project
    product: bumsys
  tags: cve,cve2023,bumsys,clickjacking,huntr,bumsys_project,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}"

    matchers:
      - type: dsl
        dsl:
          - "status_code_1 == 200"
          - "!regex('X-Frame-Options', header)"
          - "contains(body, 'BUM</b>Sys</a>')"
        condition: and
# digest: 4b0a00483046022100fc140b7071471f6868d6ffbebbd93a7d06ccf6779c1ab6cdcbd6865ddabca05a0221009e3fc1e05a1f4333e1a03ae0cc70b6c7985596ae21f09588e5812e1e38b19235:922c64590222798bb761d5b6d8e72950

相关漏洞推荐