Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-45542

EPSS 43.33% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-45542

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Cross Site Scripting vulnerability in mooSocial 3.1.8 allows a remote attacker to obtain sensitive information via a crafted script to the q parameter in the Search function.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
mooSocial 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
mooSocial是mooSocial公司的一个多平台、移动就绪、用户友好的脚本。用于构建社区驱动的内容共享和社交网络网站。 mooSocial 3.1.8版本存在安全漏洞,该漏洞源于存在跨站脚本(XSS)漏洞。攻击者可利用该漏洞通过Search功能的参数q获取敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2023-45542

#POC DescriptionSource LinkShenlong Link
1mooSocial v3.1.8 is vulnerable to cross-site scripting on search function.https://github.com/ahrixia/CVE-2023-45542POC Details
2A reflected cross-site scripting (XSS) vulnerability exisits in the q parameter on search function of mooSocial v3.1.8 which allows attackers to steal user's session cookies and impersonate their account via a crafted URL. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-45542.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-45542

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-10-16 · 33 CVEs total

CVE-2011-100046.3 MEDIUMreciply Plugin uploadImage.php unrestricted upload
CVE-2023-45984TOTOLINK X5000R和A7000R 缓冲区错误漏洞
CVE-2023-36953TOTOLINK CP300+ 命令注入漏洞
CVE-2023-36950TOTOLINK X5000R和TOTOLINK A7000R 缓冲区错误漏洞
CVE-2023-36952TOTOLINK CP300+ 缓冲区错误漏洞
CVE-2023-36947TOTOLINK X5000R和TOTOLINK A7000R 缓冲区错误漏洞
CVE-2023-36340TOTOLINK NR1800X 缓冲区错误漏洞
CVE-2023-43120Extreme Networks Switch Engine 安全漏洞
CVE-2023-45985TOTOLINK X5000R和TOTOLINK A7000R 缓冲区错误漏洞
CVE-2023-36954TOTOLINK CP300+ 命令注入漏洞
CVE-2023-40852User Management System和User Registration & Login and User Management System SQL注入漏洞
CVE-2023-40851User Management System和User Registration & Login and User Management System 跨站脚本漏洞
CVE-2023-43121Extreme Networks Switch Engine 路径遍历漏洞
CVE-2023-43119Extreme Networks Switch Engine 安全漏洞
CVE-2023-43118Extreme Networks Switch Engine 跨站请求伪造漏洞
CVE-2023-29484Terminalfour 安全漏洞
CVE-2023-45540Jorani 注入漏洞
CVE-2023-36955TOTOLINK CP300+ 缓冲区错误漏洞
CVE-2023-44808D-Link DIR-820L 缓冲区错误漏洞
CVE-2023-44809D-Link DIR-820L 安全漏洞

Showing top 20 of 33 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-45542

No comments yet


Leave a comment