Last active
February 4, 2021 01:19
-
-
Save harsh-bothra/d8c86b8279b23ff6d371f832ba0a5b6b to your computer and use it in GitHub Desktop.
Cross-Site Scripting in NeDi 1.9C
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Product: NeDi - Find IT | |
CVE: CVE-2020-23989 | |
Version: 1.9C | |
Vulnerability: Reflected Cross-Site Scripting | |
Vulnerability Description: NeDi 1.9C allows Cross-Site Scripting via "oid" parameter at "pwsec.php" page. | |
# Steps to Reproduce | |
1. Log in to the application with provided credentials. | |
2. Navigate to "https://<nedi_server_ip>/pwsec.php" page. | |
3. Add "oid" parameter at the end of the URL with XSS Payload like below: | |
> https://<nedi_server_ip>/pwsec.php?oid=<img src=x onerror=alert(document.domain)> | |
4. Observe that the XSS Payload provided in Step-3 is executed. | |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Thanks, this is very helpful to me