### [CVE-2023-43323](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43323) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description mooSocial 3.1.8 is vulnerable to external service interaction on post function. When executed, the server sends a HTTP and DNS request to external server. The Parameters effected are multiple - messageText, data[wall_photo], data[userShareVideo] and data[userShareLink]. ### POC #### Reference - https://github.com/ahrixia/CVE-2023-43323 #### Github - https://github.com/ahrixia/CVE-2023-43323 - https://github.com/nomi-sec/PoC-in-GitHub