Enhancement: cves/2021/CVE-2021-24436.yaml by md
parent
642178a32e
commit
15fc166e95
|
@ -1,17 +1,17 @@
|
|||
id: CVE-2021-24436
|
||||
|
||||
info:
|
||||
name: W3 Total Cache < 2.1.3 - Reflected XSS in Extensions Page
|
||||
name: WordPress W3 Total Cache <2.1.4 - Cross-Site Scripting
|
||||
author: theamanrawat
|
||||
severity: medium
|
||||
description: |
|
||||
The W3 Total Cache WordPress plugin before 2.1.4 was vulnerable to a reflected Cross-Site Scripting (XSS) security vulnerability within the "extension" parameter in the Extensions dashboard, which is output in an attribute without being escaped first. This could allow an attacker, who can convince an authenticated admin into clicking a link, to run malicious JavaScript within the user's web browser, which could lead to full site compromise.
|
||||
WordPress W3 Total Cache plugin before 2.1.4 is susceptible to cross-site scripting within the "extension" parameter in the Extensions dashboard, which is output in an attribute without being escaped first. This can allow an attacker to convince an authenticated admin into clicking a link to run malicious JavaScript within the user's web browser, which could lead to full site compromise.
|
||||
reference:
|
||||
- https://wpscan.com/vulnerability/3e855e09-056f-45b5-89a9-d644b7d8c9d0
|
||||
- https://wordpress.org/plugins/w3-total-cache/
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-24436
|
||||
- https://wpscan.com/vulnerability/05988ebb-7378-4a3a-9d2d-30f8f58fe9ef
|
||||
remediation: Fixed in version 2.1.4
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-24436
|
||||
remediation: Fixed in version 2.1.4.
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
||||
cvss-score: 6.1
|
||||
|
@ -42,3 +42,5 @@ requests:
|
|||
- contains(body_2, '><script>alert(document.domain)</script>&action=view')
|
||||
- contains(all_headers_2, "text/html")
|
||||
condition: and
|
||||
|
||||
# Enhanced by md on 2023/03/28
|
||||
|
|
Loading…
Reference in New Issue