diff --git a/http/cves/2016/CVE-2016-10976.yaml b/http/cves/2016/CVE-2016-10976.yaml index 643934cea2..4833b4cef2 100644 --- a/http/cves/2016/CVE-2016-10976.yaml +++ b/http/cves/2016/CVE-2016-10976.yaml @@ -1,7 +1,7 @@ id: CVE-2016-10976 info: - name: safe-editor <= 1.1 - Unauthenticated CSS/JS-injection + name: Safe Editor Plugin < 1.2 - CSS/JS-injection author: Splint3r7 severity: medium description: | @@ -9,9 +9,9 @@ info: remediation: | Update to the latest version of safe-editor plugin or apply the patch provided by the vendor. reference: - - https://nvd.nist.gov/vuln/detail/CVE-2016-10976 - https://wordpress.org/plugins/safe-editor/#developers - https://github.com/ARPSyndicate/cvemon + - https://nvd.nist.gov/vuln/detail/CVE-2016-10976 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 @@ -25,7 +25,7 @@ info: vendor: kodebyraaet product: safe_editor framework: wordpress - tags: cve,cve2016,wordpress,plugin,xss,safeeditor + tags: cve,cve2016,wordpress,wp,wp-plugin,xss,safe_editor flow: http(1) && http(2) @@ -36,7 +36,7 @@ http: Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8 - action=se_save&type=js&data=alert("document.domain") + action=se_save&type=js&data=alert(document.domain) matchers: - type: dsl @@ -56,5 +56,5 @@ http: dsl: - 'status_code == 200' - 'contains(content_type, "text/html")' - - 'contains_all(body, "alert(\"document.domain\")", "save_edit_js")' + - 'contains_all(body, "alert(document.domain)", "save_edit_js")' condition: and