Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-16172 PoC — LimeSurvey 跨站脚本漏洞

Source
Associated Vulnerability
Title:LimeSurvey 跨站脚本漏洞 (CVE-2019-16172)
Description:LimeSurvey(前称PHPSurveyor)是LimeSurvey团队的一套开源的在线问卷调查程序,它支持调查程序开发、调查问卷发布以及数据收集等功能。 LimeSurvey 3.17.14之前版本中存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Description
The CVE-2019-16172 Scanner is designed to check LimeSurvey instances for the stored XSS vulnerability.
Readme
# CVE-2019-16172
The CVE-2019-16172 Scanner is designed to check LimeSurvey instances for the stored XSS vulnerability.


## CVE Descriptions
### CVE-2019-16172
Description: CVE-2019-16172 is a stored XSS vulnerability found in LimeSurvey versions prior to 3.17. The vulnerability arises due to improper validation of user inputs when creating survey groups. An attacker can exploit this vulnerability by submitting a specially crafted payload, which can be stored on the server and executed in the context of other users accessing the survey.

Impact: Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the application, leading to potential data exfiltration, session hijacking, and other malicious activities.

## Scanner Descriptions
### CVE-2019-16172 Scanner
The CVE-2019-16172 Scanner is designed to check LimeSurvey instances for the stored XSS vulnerability. It sends a crafted payload to the /admin/survey/group/create endpoint and evaluates the response to determine if the server is vulnerable.

## Usage:

### Command: python cve_2019_16172_scanner.py --url <target_url>
#### Options:
--url: Specify a single URL to scan.
--file: Provide a file with multiple URLs for batch scanning.
--timeout: Set the request timeout (default is 10 seconds).
--threads: Specify the number of parallel threads for scanning (default is 5).
--output: Save results to a specified output file.



### Follow Us on Telegram
Stay updated with the latest tools and hacking resources. Join our Telegram Channel by clicking the logo below:

[![Telegram](https://upload.wikimedia.org/wikipedia/commons/thumb/8/82/Telegram_logo.svg/240px-Telegram_logo.svg.png)](https://t.me/Trixsec)
File Snapshot

[4.0K] /data/pocs/4701c5c607500c81287dc86d99b2b1b6b10564ad ├── [3.4K] CVE-2019-16172.py ├── [ 34K] LICENSE └── [1.7K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.