fix-matcher

patch-11
Dhiyaneshwaran 2024-09-10 23:29:17 +05:30 committed by GitHub
parent 935442a762
commit a876538b83
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 15 additions and 2 deletions

View File

@ -2,7 +2,7 @@ id: CVE-2021-24274
info: info:
name: WordPress Supsystic Ultimate Maps <1.2.5 - Cross-Site Scripting name: WordPress Supsystic Ultimate Maps <1.2.5 - Cross-Site Scripting
author: dhiyaneshDK author: DhiyaneshDK
severity: medium severity: medium
description: WordPress Supsystic Ultimate Maps plugin before 1.2.5 contains an unauthenticated reflected cross-site scripting vulnerability due to improper sanitization of the tab parameter on the options page before outputting it in an attribute. description: WordPress Supsystic Ultimate Maps plugin before 1.2.5 contains an unauthenticated reflected cross-site scripting vulnerability due to improper sanitization of the tab parameter on the options page before outputting it in an attribute.
impact: | impact: |
@ -30,6 +30,19 @@ info:
framework: wordpress framework: wordpress
tags: cve2021,cve,wpscan,packetstorm,wordpress,wp-plugin,maps,supsystic,xss tags: cve2021,cve,wpscan,packetstorm,wordpress,wp-plugin,maps,supsystic,xss
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
matchers:
- type: word
internal: true
words:
- '/wp-content/plugins/ultimate-maps-by-supsystic/modules/maps/css/'
condition: and
http: http:
- method: GET - method: GET
path: path:
@ -38,9 +51,9 @@ http:
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: body
words: words:
- '</script><script>alert(document.domain)</script>' - '</script><script>alert(document.domain)</script>'
condition: and
- type: word - type: word
part: header part: header