CVE-2023-53870
Reflected XSS in Jorani 1.0.3 Language Parameter Risks Session Theft
Publication date: 2025-12-15
Last updated on: 2025-12-15
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jorani | jorani | 1.0.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2023-53870 is a reflected cross-site scripting (XSS) vulnerability in Jorani version 1.0.3. It occurs because the 'language' parameter in the POST /session/login request is not properly sanitized or encoded before being included in a JavaScript string in the HTTP response. Attackers can inject malicious JavaScript code via this parameter, which then executes in the victim's browser. This allows attackers to run arbitrary scripts, such as stealing user session cookies or manipulating session tokens. [1, 3]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to execute arbitrary JavaScript in your browser when interacting with the vulnerable Jorani application. This can lead to theft of user session information, manipulation of session tokens, and potential access to sensitive server information. The reflected XSS can also be used to perform other malicious actions in the context of the victim's session, potentially compromising user accounts and data. [1, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by sending crafted HTTP POST requests to the /session/login endpoint with malicious payloads in the language parameter and observing if the payload is reflected unescaped in the response. For example, you can use curl to send a test payload like: curl -X POST -d "language=75943\";alert(1)//569" https://your-jorani-instance/session/login and check if the response contains the injected script. Additionally, monitoring HTTP responses for PHP error messages related to deprecated functions or header modification warnings may indicate the vulnerability. Tools like Burp Suite or OWASP ZAP can also be used to automate detection of reflected XSS by injecting payloads into the language parameter and analyzing responses. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include sanitizing and properly encoding the language parameter input to prevent script injection. If you are running Jorani 1.0.3, consider applying any available patches or updates from the vendor that address this vulnerability. As a temporary workaround, restrict access to the /session/login endpoint or implement web application firewall (WAF) rules to block requests containing suspicious payloads in the language parameter. Additionally, educate users to avoid clicking on suspicious links that may exploit this reflected XSS vulnerability. [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows attackers to execute arbitrary JavaScript and potentially steal user session information, which could lead to unauthorized access to sensitive user data. This type of security flaw may impact compliance with standards and regulations such as GDPR and HIPAA that require protection of personal and sensitive information. However, specific effects on compliance are not detailed in the provided resources. [1, 3]