-
Notifications
You must be signed in to change notification settings - Fork 25
/
Copy path1-flash-gallery-plugin.yaml
58 lines (51 loc) · 1.62 KB
/
1-flash-gallery-plugin.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
id: 1-flash-gallery-plugin
info:
name: >
1 Flash Gallery <= 1.9.0 - Cross-Site Scripting
author: topscoder
severity: medium
description: >
The 1 Flash Gallery plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.9.0 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser.
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/8fea93d2-c1a5-416d-90d4-92304d8dc41f?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id:
metadata:
fofa-query: "wp-content/plugins/1-flash-gallery/"
google-query: inurl:"/wp-content/plugins/1-flash-gallery/"
shodan-query: 'vuln:'
tags: cve,wordpress,wp-plugin,1-flash-gallery,medium
http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/1-flash-gallery/readme.txt"
extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"
- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "1-flash-gallery"
part: body
- type: dsl
dsl:
- compare_versions(version, '<= 1.9.0')