.. / CVE-2022-46888

Exploit for NexusPHP <1.7.33 - Cross-Site Scripting (CVE-2022-46888)

Description:

NexusPHP before 1.7.33 contains multiple cross-site scripting vulnerabilities via the secret parameter in /login.php; q parameter in /user-ban-log.php; query parameter in /log.php; text parameter in /moresmiles.php; q parameter in myhr.php; or id parameter in /viewrequests.php. An attacker can inject arbitrary web script or HTML, which can allow theft of cookie-based authentication credentials and launch of other attacks..

Nuclei Template

View the template here CVE-2022-46888.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-46888.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
https://github.com/xiaomlove/nexusphp/releases/tag/v1.7.33
https://github.com/ARPSyndicate/kenzer-templates
https://nvd.nist.gov/vuln/detail/CVE-2022-46888
https://www.surecloud.com/resources/blog/nexusphp-surecloud-security-review-identifies-authenticated-unauthenticated-vulnerabilities