Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Laravel Ignition - Cross-Site Scripting

By kannthu

High
Vidoc logoVidoc Module
#laravel#xss#ignition
Description

What is the "Laravel Ignition - Cross-Site Scripting" module?

The "Laravel Ignition - Cross-Site Scripting" module is designed to detect a cross-site scripting vulnerability in Laravel Ignition when debug mode is enabled. Laravel Ignition is a debugging dashboard specifically built for Laravel applications. This module focuses on identifying and reporting the presence of a high-severity cross-site scripting vulnerability in Laravel Ignition.

Impact

A cross-site scripting vulnerability in Laravel Ignition can allow attackers to inject malicious scripts into web pages viewed by users. This can lead to various security risks, including unauthorized access to sensitive information, session hijacking, and the execution of arbitrary code on the affected system.

How does the module work?

The "Laravel Ignition - Cross-Site Scripting" module works by sending HTTP requests to the target system and analyzing the responses for specific patterns. It checks for the presence of the following conditions:

- The response body contains the phrase "Undefined index: --><svg onload=alert(document.domain)> in file". - The response header contains the content type "text/html". - The response status code is 500 (Internal Server Error).

If all of these conditions are met, the module identifies the presence of the cross-site scripting vulnerability in Laravel Ignition and reports it as a high-severity issue.

Example HTTP request sent by the module:

GET /_ignition/scripts/--><svg%20onload=alert(document.domain)> HTTP/1.1
Host: [target host]

Please note that this description provides an overview of the module's purpose, impact, and technical workings. For more detailed information, refer to the JSON definition of the module.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/_ignition/scripts/-...
Matching conditions
word: Undefined index: --><svg onload=alert(do...and
word: text/htmland
status: 500
Passive global matcher
No matching conditions.
On match action
Report vulnerability