Cleanups and syntax
parent
22b170b7f4
commit
d5e97c14b1
|
@ -29,8 +29,8 @@ variables:
|
|||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- '{{BaseURL}}/?search==%00{.exec|cmd.exe+/c+ping+127.0.0.1+-n+10.}'
|
||||
#- '{{BaseURL}}/?search==%00{.cookie|{{str1}}|value%3d{{str2}}.}'
|
||||
- '{{BaseURL}}/?search==%00{.exec|cmd.exe+/c+ping+127.0.0.1+-n+10.}'
|
||||
# - '{{BaseURL}}/?search==%00{.cookie|{{str1}}|value%3d{{str2}}.}'
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
|
|
|
@ -5,8 +5,7 @@ info:
|
|||
author: dwisiswant0
|
||||
severity: medium
|
||||
description: |
|
||||
WordPress Transposh plugin through is susceptible to information disclosure via the AJAX action
|
||||
tp_history, which is intended to return data about who has translated a text given by the token parameter. However, the plugin also returns the user's login name as part of the user_login attribute. If an anonymous user submits the translation, the user's IP address is returned. An attacker can leak the WordPress username of translators and potentially execute other unauthorized operations.
|
||||
WordPress Transposh plugin through is susceptible to information disclosure via the AJAX action tp_history, which is intended to return data about who has translated a text given by the token parameter. However, the plugin also returns the user's login name as part of the user_login attribute. If an anonymous user submits the translation, the user's IP address is returned. An attacker can leak the WordPress username of translators and potentially execute other unauthorized operations.
|
||||
reference:
|
||||
- https://packetstormsecurity.com/files/167878/wptransposh1081-disclose.txt
|
||||
- https://github.com/oferwald/transposh
|
||||
|
|
|
@ -5,7 +5,7 @@ info:
|
|||
author: r3Y3r53
|
||||
severity: medium
|
||||
description: |
|
||||
WordPress Watu Quiz plugin before 3.3.9.1 is susceptible to cross-site scripting. The plugin does not sanitize and escape some parameters, such as email, dn, date, and points, before outputting then back in a page. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This exploit can be used against high-privilege users such as admin.
|
||||
WordPress Watu Quiz plugin before 3.3.9.1 is susceptible to cross-site scripting. The plugin does not sanitize and escape some parameters, such as email, dn, date, and points, before outputting then back in a page. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This exploit can be used against high-privilege users such as admin.
|
||||
reference:
|
||||
- https://wpscan.com/vulnerability/29008d1a-62b3-4f40-b5a3-134455b01595
|
||||
- https://wordpress.org/plugins/watu/
|
||||
|
|
Loading…
Reference in New Issue