28 lines
1.1 KiB
YAML
28 lines
1.1 KiB
YAML
id: addeventlistener-detect
|
|
|
|
info:
|
|
name: DOM EventListener - Cross-Site Scripting
|
|
author: yavolo,dwisiswant0
|
|
severity: info
|
|
description: EventListener contains a cross-site scripting vulnerability via the document object model (DOM). An attacker can execute arbitrary script which can then allow theft of cookie-based authentication credentials and launch of other attacks.
|
|
reference:
|
|
- https://portswigger.net/web-security/dom-based/controlling-the-web-message-source
|
|
classification:
|
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
|
|
cvss-score: 7.2
|
|
cwe-id: CWE-79
|
|
metadata:
|
|
max-request: 1
|
|
tags: miscellaneous,xss,misc
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}"
|
|
|
|
matchers:
|
|
- type: regex
|
|
part: body
|
|
regex:
|
|
- (([\w\_]+)\.)?add[Ee]vent[Ll]istener\(["']?[\w\_]+["']? # Test cases: https://www.regextester.com/?fam=121118
|
|
# digest: 4a0a004730450221009a68dcfa751648f752810974d04f29cba6032e3ae68db81b3d5514f51a310e1d02204f8ef054bb163e090a0aecc21a9802122ad9a0adbc42464f34696b078282a896:922c64590222798bb761d5b6d8e72950 |