Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-10128 PoC — SearchBlox 跨站脚本漏洞

Source
Associated Vulnerability
Title:SearchBlox 跨站脚本漏洞 (CVE-2020-10128)
Description:SearchBlox是美国SearchBlox公司的一个应用软件。为内部部署或云部署提供了强大的企业搜索体系结构。 SearchBlox 9.2.1之前版本存在安全漏洞,该漏洞源于容易受到多个存储型跨站脚本攻击,这使得攻击者可以注入恶意JavaScript。
Description
CVE-2020-10128 - SearchBlox product before V-9.2.1 is vulnerable to Stored-Cross Site Scripting
Readme
# CVE-2020-10128 - SearchBlox product before V-9.2.1 is vulnerable to Stored-Cross Site Scripting

**Product Description:** SearchBlox simplifies enterprise search for complex organizations. SearchBlox intuitive and intelligent tools offer out-of-the-box setup, secure encryption, and low total cost of ownership. AI-powered solutions optimize each step of the search journey to dramatically improve engagement. SearchBlox is the easy choice for leaders in financial services, healthcare, and government.

**Description:** SearchBlox before Version 9.2.1 is vulnerable to Stored Cross Site Scripting.

**Vulnerability Type:** Stored Cross Site Scripting

**Severity Rating:** High

**Vendor of Product:** SearchBlox

**Affected Product Code Base:** SearchBlox-9.2

**Affected Component:** SearchBlox product with version before 9.2.1 is vulnerable to stored cross-site scripting at multiple user input parameters. In SearchBlox products multiple parameters are not sanitized/validate properly which allows an attacker to inject malicious JavaScript.

**Attack Type:** Remote

**Impact Information Disclosure:** True

**Attack Vectors:** To exploit this vulnerability attacker must enter XSS payload at multiple vulnerable parameters.
                      http://<Web-Interface-URLs>/searchblox/admin/main.jsp?menu1=adm 
                      
**Has the vendor confirmed or acknowledged the vulnerability?:** True

**Reference:** [Version 9.1 (searchblox.com) ](https://developer.searchblox.com/v9.2/changelog/version-91) & [Version 9.2.1 (searchblox.com) ](https://developer.searchblox.com/v9.2/changelog/version-921)

**Exploit Author:** Amar Kaldate

**Contact:** [ Amar Kaldate | LinkedIn ](https://www.linkedin.com/in/amar-kaldate/)
File Snapshot

[4.0K] /data/pocs/ad80ed4e0d0112c6f2d7357e8c794da17322deea └── [1.7K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.