🥷
Red Team Articles
Linktree
  • ⚙️Binary Exploitation
    • PWN com 1 byte
    • GOT e PLT
    • Hook na GOT
  • 🌐Web
    • Mysql Case Sensitive Problems
    • Ruby: regex authentication bypass
    • CVE-2023-38964
  • 📲Mobile
    • 🍎iOS Pentest
      • 🤖How to use Frida on iOS 17 without Jailbreak
      • 💻Setup Lab
      • 📦Insecure Data Storage
        • Dump keychain datas
      • 🔙Server Side Vulnerabilities
        • Setup Proxy
        • Pentest on Server Side
      • ⚙️Client Side Vulnerabilities
        • Account theft
        • Insecure Logging
      • 🖱️Pasteboard & Clipboard
    • 🤖Android Pentest
      • AB - Android Backup
  • 🐳Docker
    • 🚪Backdooring docker container
    • 🪜Docker breakout
      • docker.sock
      • privileged flag
      • environments
    • 🏎️Docker assessment
      • Assessment with trivy
      • Assessment with docker bench security
    • 🛡️Defenses
      • AppArmor
      • SecComp
      • Capabilities
      • Docker content trust
    • 📖Namespaces
  • 🖥️SSH Tricks
  • Network
    • VPN WireGuard com pfSense + RestAPI
Powered by GitBook
On this page
  • Introduction
  • Code Analysis
  • Attack
  1. Web

CVE-2023-38964

PreviousRuby: regex authentication bypassNextiOS Pentest

Last updated 1 year ago

Introduction

I was searching for an LMS (Learning Management System), which is like a CMS (Content Management System) but specifically designed for managing courses. During my search, I came across "Academy LMS 6.0". I purchased this product and decided to test it for vulnerabilities before uploading my courses and deploying it on my site.

Code Analysis

At application > controllers > Home.php, on line 855, we found the search function, and on lines 858 - 865, it is checked for XSS payloads.

These checks only if $_GET['query'] contains " and script string.

Attack

Intercepting query request with burp:

"TESTT" is reflected in source code:

We have two vectors for attack:

  1. Weak verification

  2. Input reflect on the page

Go test the following payload:

"><svg+onload=alert(1)>
🌐
Vulnerable Code
Request
Reflect on the page
XSS Payload