Update CVE-2021-24910.yaml
parent
a14e17d273
commit
b3b9314480
|
@ -8,9 +8,10 @@ info:
|
|||
- https://www.rcesecurity.com/2022/07/WordPress-Transposh-Exploiting-a-Blind-SQL-Injection-via-XSS/
|
||||
- https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-24910.txt
|
||||
- https://wpscan.com/vulnerability/b5cbebf4-5749-41a0-8be3-3333853fca17
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24910
|
||||
metadata:
|
||||
verified: true
|
||||
tags: cve,cve2021,wordpress,wp-plugin,xss
|
||||
tags: cve,cve2021,wordpress,wp-plugin,xss,wp
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
|
@ -20,14 +21,16 @@ requests:
|
|||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- "<img src=x onerror=alert(document.domain)>"
|
||||
part: body
|
||||
words:
|
||||
- '<img src=x onerror=alert(document.domain)>'
|
||||
- '{"result":'
|
||||
condition: and
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- "text/html"
|
||||
part: header
|
||||
|
||||
- type: status
|
||||
status:
|
||||
|
|
Loading…
Reference in New Issue