From 932d001ed860ee8a528130957b20c22b4d8a4a82 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha Date: Fri, 18 Oct 2024 17:09:05 +0530 Subject: [PATCH] lint fix --- http/cves/2023/CVE-2023-5561.yaml | 4 ++-- http/vulnerabilities/wordpress/wp-footnote-xss.yaml | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/http/cves/2023/CVE-2023-5561.yaml b/http/cves/2023/CVE-2023-5561.yaml index 00875faff0..c50275fbe7 100644 --- a/http/cves/2023/CVE-2023-5561.yaml +++ b/http/cves/2023/CVE-2023-5561.yaml @@ -56,11 +56,11 @@ http: - "wp-json/wp/v2/users?" - "?rest_route=/wp/v2/users&" attack: clusterbomb - + matchers: - type: dsl dsl: - 'status_code == 200' - 'contains(content_type, "application/json")' - 'contains_all(body, "[{\"id", "name\":", "@")' - condition: and + condition: and \ No newline at end of file diff --git a/http/vulnerabilities/wordpress/wp-footnote-xss.yaml b/http/vulnerabilities/wordpress/wp-footnote-xss.yaml index 32d4051c20..025532291b 100644 --- a/http/vulnerabilities/wordpress/wp-footnote-xss.yaml +++ b/http/vulnerabilities/wordpress/wp-footnote-xss.yaml @@ -1,7 +1,7 @@ id: wp-footnote-xss info: - name: WordPress 6.3-6.3.1 Footnotes Block - Cross-Site Scripting + name: WordPress 6.3-6.3.1 Footnotes Block - Cross-Site Scripting author: nqdung2002 severity: medium description: | @@ -66,7 +66,7 @@ http: - 'contains(body_4, "")' - 'contains(header_4, "text/html")' condition: and - + extractors: - type: regex name: postid