Cleanups and syntax

patch-1
sullo 2023-04-17 09:23:19 -04:00
parent 22b170b7f4
commit d5e97c14b1
3 changed files with 4 additions and 5 deletions

View File

@ -29,8 +29,8 @@ variables:
requests:
- method: GET
path:
- '{{BaseURL}}/?search==%00{.exec|cmd.exe+/c+ping+127.0.0.1+-n+10.}'
#- '{{BaseURL}}/?search==%00{.cookie|{{str1}}|value%3d{{str2}}.}'
- '{{BaseURL}}/?search==%00{.exec|cmd.exe+/c+ping+127.0.0.1+-n+10.}'
# - '{{BaseURL}}/?search==%00{.cookie|{{str1}}|value%3d{{str2}}.}'
matchers-condition: and
matchers:

View File

@ -5,8 +5,7 @@ info:
author: dwisiswant0
severity: medium
description: |
WordPress Transposh plugin through is susceptible to information disclosure via the AJAX action
tp_history, which is intended to return data about who has translated a text given by the token parameter. However, the plugin also returns the user's login name as part of the user_login attribute. If an anonymous user submits the translation, the user's IP address is returned. An attacker can leak the WordPress username of translators and potentially execute other unauthorized operations.
WordPress Transposh plugin through is susceptible to information disclosure via the AJAX action tp_history, which is intended to return data about who has translated a text given by the token parameter. However, the plugin also returns the user's login name as part of the user_login attribute. If an anonymous user submits the translation, the user's IP address is returned. An attacker can leak the WordPress username of translators and potentially execute other unauthorized operations.
reference:
- https://packetstormsecurity.com/files/167878/wptransposh1081-disclose.txt
- https://github.com/oferwald/transposh

View File

@ -5,7 +5,7 @@ info:
author: r3Y3r53
severity: medium
description: |
WordPress Watu Quiz plugin before 3.3.9.1 is susceptible to cross-site scripting. The plugin does not sanitize and escape some parameters, such as email, dn, date, and points, before outputting then back in a page. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This exploit can be used against high-privilege users such as admin.
WordPress Watu Quiz plugin before 3.3.9.1 is susceptible to cross-site scripting. The plugin does not sanitize and escape some parameters, such as email, dn, date, and points, before outputting then back in a page. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This exploit can be used against high-privilege users such as admin.
reference:
- https://wpscan.com/vulnerability/29008d1a-62b3-4f40-b5a3-134455b01595
- https://wordpress.org/plugins/watu/