Cleanups and syntax
parent
22b170b7f4
commit
d5e97c14b1
|
@ -29,8 +29,8 @@ variables:
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
path:
|
path:
|
||||||
- '{{BaseURL}}/?search==%00{.exec|cmd.exe+/c+ping+127.0.0.1+-n+10.}'
|
- '{{BaseURL}}/?search==%00{.exec|cmd.exe+/c+ping+127.0.0.1+-n+10.}'
|
||||||
#- '{{BaseURL}}/?search==%00{.cookie|{{str1}}|value%3d{{str2}}.}'
|
# - '{{BaseURL}}/?search==%00{.cookie|{{str1}}|value%3d{{str2}}.}'
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -5,8 +5,7 @@ info:
|
||||||
author: dwisiswant0
|
author: dwisiswant0
|
||||||
severity: medium
|
severity: medium
|
||||||
description: |
|
description: |
|
||||||
WordPress Transposh plugin through is susceptible to information disclosure via the AJAX action
|
WordPress Transposh plugin through is susceptible to information disclosure via the AJAX action tp_history, which is intended to return data about who has translated a text given by the token parameter. However, the plugin also returns the user's login name as part of the user_login attribute. If an anonymous user submits the translation, the user's IP address is returned. An attacker can leak the WordPress username of translators and potentially execute other unauthorized operations.
|
||||||
tp_history, which is intended to return data about who has translated a text given by the token parameter. However, the plugin also returns the user's login name as part of the user_login attribute. If an anonymous user submits the translation, the user's IP address is returned. An attacker can leak the WordPress username of translators and potentially execute other unauthorized operations.
|
|
||||||
reference:
|
reference:
|
||||||
- https://packetstormsecurity.com/files/167878/wptransposh1081-disclose.txt
|
- https://packetstormsecurity.com/files/167878/wptransposh1081-disclose.txt
|
||||||
- https://github.com/oferwald/transposh
|
- https://github.com/oferwald/transposh
|
||||||
|
|
|
@ -5,7 +5,7 @@ info:
|
||||||
author: r3Y3r53
|
author: r3Y3r53
|
||||||
severity: medium
|
severity: medium
|
||||||
description: |
|
description: |
|
||||||
WordPress Watu Quiz plugin before 3.3.9.1 is susceptible to cross-site scripting. The plugin does not sanitize and escape some parameters, such as email, dn, date, and points, before outputting then back in a page. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This exploit can be used against high-privilege users such as admin.
|
WordPress Watu Quiz plugin before 3.3.9.1 is susceptible to cross-site scripting. The plugin does not sanitize and escape some parameters, such as email, dn, date, and points, before outputting then back in a page. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This exploit can be used against high-privilege users such as admin.
|
||||||
reference:
|
reference:
|
||||||
- https://wpscan.com/vulnerability/29008d1a-62b3-4f40-b5a3-134455b01595
|
- https://wpscan.com/vulnerability/29008d1a-62b3-4f40-b5a3-134455b01595
|
||||||
- https://wordpress.org/plugins/watu/
|
- https://wordpress.org/plugins/watu/
|
||||||
|
|
Loading…
Reference in New Issue