added cve tag to xml file

This commit is contained in:
Christian Mehlmauer
2013-08-23 14:02:09 +02:00
parent 55089646c2
commit 1f5cb4b0a0
7 changed files with 126 additions and 52 deletions

View File

@@ -1388,9 +1388,10 @@
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>[CVE-2013-1636] WordPress pretty-link plugin XSS in SWF</title> <title>WordPress pretty-link plugin XSS in SWF</title>
<reference>http://seclists.org/bugtraq/2013/Feb/100</reference> <reference>http://seclists.org/bugtraq/2013/Feb/100</reference>
<reference>http://packetstormsecurity.com/files/120433/wpprettylink163-xss.txt</reference> <reference>http://packetstormsecurity.com/files/120433/wpprettylink163-xss.txt</reference>
<cve>2013-1636</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -1467,8 +1468,11 @@
<plugin name="download-monitor"> <plugin name="download-monitor">
<vulnerability> <vulnerability>
<title>CVE-2013-5098, CVE-2013-3262: Download Monitor &lt; 3.3.6.2 Cross Site Scripting</title> <title>Download Monitor &lt; 3.3.6.2 Cross Site Scripting</title>
<reference>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5098</reference> <reference>http://www.securityfocus.com/bid/61407</reference>
<reference>http://secunia.com/advisories/53116</reference>
<cve>2013-5098</cve>
<cve>2013-3262</cve>
<type>XSS</type> <type>XSS</type>
<fixed_in>3.3.6.2</fixed_in> <fixed_in>3.3.6.2</fixed_in>
</vulnerability> </vulnerability>
@@ -2290,9 +2294,10 @@
<type>MULTI</type> <type>MULTI</type>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>NextGEN Gallery 1.9.12 Arbitrary File Upload (CVE-2013-3684)</title> <title>NextGEN Gallery 1.9.12 Arbitrary File Upload</title>
<reference>http://wordpress.org/plugins/nextgen-gallery/changelog/</reference> <reference>http://wordpress.org/plugins/nextgen-gallery/changelog/</reference>
<reference>http://osvdb.org/94232</reference> <reference>http://osvdb.org/94232</reference>
<cve>2013-3684</cve>
<type>UPLOAD</type> <type>UPLOAD</type>
<fixed_in>1.9.13</fixed_in> <fixed_in>1.9.13</fixed_in>
</vulnerability> </vulnerability>
@@ -4128,223 +4133,249 @@
<plugin name="zopim-live-chat"> <plugin name="zopim-live-chat">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: zopim-live-chat &lt;= 1.2.5 XSS in ZeroClipboard</title> <title>zopim-live-chat &lt;= 1.2.5 XSS in ZeroClipboard</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="ed2k-link-selector"> <plugin name="ed2k-link-selector">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: ed2k-link-selector &lt;= 1.1.7 XSS in ZeroClipboard</title> <title>ed2k-link-selector &lt;= 1.1.7 XSS in ZeroClipboard</title>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="wppygments"> <plugin name="wppygments">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: wppygments &lt;= 0.3.2 XSS in ZeroClipboard</title> <title>wppygments &lt;= 0.3.2 XSS in ZeroClipboard</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="copy-in-clipboard"> <plugin name="copy-in-clipboard">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: copy-in-clipboard &lt;= 0.8 XSS in ZeroClipboard</title> <title>copy-in-clipboard &lt;= 0.8 XSS in ZeroClipboard</title>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="search-and-share"> <plugin name="search-and-share">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: search-and-share &lt;= 0.9.3 XSS in ZeroClipboard</title> <title>search-and-share &lt;= 0.9.3 XSS in ZeroClipboard</title>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="placester"> <plugin name="placester">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: placester &lt;= 0.3.12 XSS in ZeroClipboard</title> <title>placester &lt;= 0.3.12 XSS in ZeroClipboard</title>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="drp-coupon"> <plugin name="drp-coupon">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: drp-coupon &lt;= 2.1 XSS in ZeroClipboard</title> <title>drp-coupon &lt;= 2.1 XSS in ZeroClipboard</title>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="coupon-code-plugin"> <plugin name="coupon-code-plugin">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: coupon-code-plugin &lt;= 2.1 XSS in ZeroClipboard</title> <title>coupon-code-plugin &lt;= 2.1 XSS in ZeroClipboard</title>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="q2w3-inc-manager"> <plugin name="q2w3-inc-manager">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: q2w3-inc-manager &lt;= 2.3.1 XSS in ZeroClipboard</title> <title>q2w3-inc-manager &lt;= 2.3.1 XSS in ZeroClipboard</title>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="scorerender"> <plugin name="scorerender">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: scorerender &lt;= 0.3.4 XSS in ZeroClipboard</title> <title>scorerender &lt;= 0.3.4 XSS in ZeroClipboard</title>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="wp-link-to-us"> <plugin name="wp-link-to-us">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: wp-link-to-us &lt;= 2.0 XSS in ZeroClipboard</title> <title>wp-link-to-us &lt;= 2.0 XSS in ZeroClipboard</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="buckets"> <plugin name="buckets">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: buckets &lt;= 0.1.9.2 XSS in ZeroClipboard</title> <title>buckets &lt;= 0.1.9.2 XSS in ZeroClipboard</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="java-trackback"> <plugin name="java-trackback">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: java-trackback &lt;= 0.2 XSS in ZeroClipboard</title> <title>java-trackback &lt;= 0.2 XSS in ZeroClipboard</title>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="slidedeck2"> <plugin name="slidedeck2">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: slidedeck2 &lt;= 2.1.20130228 XSS in ZeroClipboard</title> <title>slidedeck2 &lt;= 2.1.20130228 XSS in ZeroClipboard</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="wp-clone-by-wp-academy"> <plugin name="wp-clone-by-wp-academy">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: wp-clone-by-wp-academy &lt;= 2.1.1 XSS in ZeroClipboard</title> <title>wp-clone-by-wp-academy &lt;= 2.1.1 XSS in ZeroClipboard</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="tiny-url"> <plugin name="tiny-url">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: tiny-url &lt;= 1.3.2 XSS in ZeroClipboard</title> <title>tiny-url &lt;= 1.3.2 XSS in ZeroClipboard</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="thethe-layout-grid"> <plugin name="thethe-layout-grid">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: thethe-layout-grid &lt;= 1.0.0 XSS in ZeroClipboard.</title> <title>thethe-layout-grid &lt;= 1.0.0 XSS in ZeroClipboard.</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="paypal-digital-goods-monetization-powered-by-cleeng"> <plugin name="paypal-digital-goods-monetization-powered-by-cleeng">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: paypal-digital-goods-monetization-powered-by-cleeng &lt;= 2.2.13 XSS in ZeroClipboard</title> <title>paypal-digital-goods-monetization-powered-by-cleeng &lt;= 2.2.13 XSS in ZeroClipboard</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="mobileview"> <plugin name="mobileview">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: mobileview &lt;= 1.0.7 XSS in ZeroClipboard</title> <title>mobileview &lt;= 1.0.7 XSS in ZeroClipboard</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="jaspreetchahals-coupons-lite"> <plugin name="jaspreetchahals-coupons-lite">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: jaspreetchahals-coupons-lite &lt;= 2.1 XSS in ZeroClipboard</title> <title>jaspreetchahals-coupons-lite &lt;= 2.1 XSS in ZeroClipboard</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="geshi-source-colorer"> <plugin name="geshi-source-colorer">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: geshi-source-colorer &lt;= 0.13 XSS in ZeroClipboard</title> <title>geshi-source-colorer &lt;= 0.13 XSS in ZeroClipboard</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="click-to-copy-grab-box"> <plugin name="click-to-copy-grab-box">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: click-to-copy-grab-box &lt;= 0.1.1 XSS in ZeroClipboard</title> <title>click-to-copy-grab-box &lt;= 0.1.1 XSS in ZeroClipboard</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="cleeng"> <plugin name="cleeng">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: cleeng &lt;= 2.3.2 XSS in ZeroClipboard</title> <title>cleeng &lt;= 2.3.2 XSS in ZeroClipboard</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="bp-code-snippets"> <plugin name="bp-code-snippets">
<vulnerability> <vulnerability>
<title>CVE-2013-1808: bp-code-snippets &lt;= 2.0 XSS in ZeroClipboard</title> <title>bp-code-snippets &lt;= 2.0 XSS in ZeroClipboard</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/2</reference>
<reference>http://1337day.com/exploit/20396</reference> <reference>http://1337day.com/exploit/20396</reference>
<cve>2013-1808</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="snazzy-archives"> <plugin name="snazzy-archives">
<vulnerability> <vulnerability>
<title>CVE-2009-4168: snazzy-archives &lt;= 1.7.1 XSS vulnerability</title> <title>snazzy-archives &lt;= 1.7.1 XSS vulnerability</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/10/3</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/10/3</reference>
<cve>2009-4168</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="vkontakte-api"> <plugin name="vkontakte-api">
<vulnerability> <vulnerability>
<title>CVE-2009-4168: vkontakte-api XSS vulnerability</title> <title>vkontakte-api XSS vulnerability</title>
<reference>http://www.openwall.com/lists/oss-security/2013/03/11/1</reference> <reference>http://www.openwall.com/lists/oss-security/2013/03/11/1</reference>
<cve>2009-4168</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -4436,7 +4467,7 @@
<title>ofc_upload_image.php Arbitrary File Upload Vulnerability</title> <title>ofc_upload_image.php Arbitrary File Upload Vulnerability</title>
<reference>http://www.exploit-db.com/exploits/24492/</reference> <reference>http://www.exploit-db.com/exploits/24492/</reference>
<reference>http://secunia.com/advisories/37903</reference> <reference>http://secunia.com/advisories/37903</reference>
<reference>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4140</reference> <cve>2009-4140</cve>
<type>UPLOAD</type> <type>UPLOAD</type>
<fixed_in>0.5</fixed_in> <fixed_in>0.5</fixed_in>
</vulnerability> </vulnerability>
@@ -4538,7 +4569,7 @@
<vulnerability> <vulnerability>
<title>facebook-members CSRF</title> <title>facebook-members CSRF</title>
<reference>https://secunia.com/advisories/52962/</reference> <reference>https://secunia.com/advisories/52962/</reference>
<reference>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2703</reference> <cve>2013-2703</cve>
<type>CSRF</type> <type>CSRF</type>
<fixed_in>5.0.5</fixed_in> <fixed_in>5.0.5</fixed_in>
</vulnerability> </vulnerability>
@@ -4548,7 +4579,7 @@
<vulnerability> <vulnerability>
<title>foursquare-checkins CSRF</title> <title>foursquare-checkins CSRF</title>
<reference>https://secunia.com/advisories/53151/</reference> <reference>https://secunia.com/advisories/53151/</reference>
<reference>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2709</reference> <cve>2013-2709</cve>
<type>CSRF</type> <type>CSRF</type>
<fixed_in>1.3</fixed_in> <fixed_in>1.3</fixed_in>
</vulnerability> </vulnerability>
@@ -4567,7 +4598,7 @@
<vulnerability> <vulnerability>
<title>all-in-one-webmaster CSRF</title> <title>all-in-one-webmaster CSRF</title>
<reference>https://secunia.com/advisories/52877/</reference> <reference>https://secunia.com/advisories/52877/</reference>
<reference>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2696</reference> <cve>2013-2696</cve>
<type>CSRF</type> <type>CSRF</type>
<fixed_in>8.2.4</fixed_in> <fixed_in>8.2.4</fixed_in>
</vulnerability> </vulnerability>
@@ -4619,7 +4650,7 @@
<vulnerability> <vulnerability>
<title>easy-adsense-lite CSRF</title> <title>easy-adsense-lite CSRF</title>
<reference>https://secunia.com/advisories/52953/</reference> <reference>https://secunia.com/advisories/52953/</reference>
<reference>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2702</reference> <cve>2013-2702</cve>
<type>CSRF</type> <type>CSRF</type>
<fixed_in>6.10</fixed_in> <fixed_in>6.10</fixed_in>
</vulnerability> </vulnerability>
@@ -4627,27 +4658,31 @@
<plugin name="uk-cookie"> <plugin name="uk-cookie">
<vulnerability> <vulnerability>
<title>CVE-2012-5856: uk-cookie plugin XSS</title> <title>uk-cookie plugin XSS</title>
<reference>http://osvdb.org/87561</reference> <reference>http://osvdb.org/87561</reference>
<reference>http://seclists.org/bugtraq/2012/Nov/50</reference> <reference>http://seclists.org/bugtraq/2012/Nov/50</reference>
<cve>2012-5856</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
<vulnerability> <vulnerability>
<title>CVE-2013-2180: uk-cookie CSRF</title> <title>uk-cookie CSRF</title>
<reference>http://www.openwall.com/lists/oss-security/2013/06/06/10</reference> <reference>http://www.openwall.com/lists/oss-security/2013/06/06/10</reference>
<reference>http://osvdb.org/94032</reference> <reference>http://osvdb.org/94032</reference>
<cve>2013-2180</cve>
<type>CSRF</type> <type>CSRF</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="wp-cleanfix"> <plugin name="wp-cleanfix">
<vulnerability> <vulnerability>
<title>CVE-2013-2108|CVE-2013-2109: wp-cleanfix Remote Command Execution, CSRF and XSS</title> <title>wp-cleanfix Remote Command Execution, CSRF and XSS</title>
<reference>https://github.com/wpscanteam/wpscan/issues/186</reference> <reference>https://github.com/wpscanteam/wpscan/issues/186</reference>
<reference>http://wordpress.org/support/topic/plugin-wp-cleanfix-remote-code-execution-warning</reference> <reference>http://wordpress.org/support/topic/plugin-wp-cleanfix-remote-code-execution-warning</reference>
<reference>http://osvdb.org/93450</reference> <reference>http://osvdb.org/93450</reference>
<reference>http://secunia.com/advisories/53395/</reference> <reference>http://secunia.com/advisories/53395/</reference>
<reference>http://osvdb.org/93468</reference> <reference>http://osvdb.org/93468</reference>
<cve>2013-2108</cve>
<cve>2013-2109</cve>
<type>MULTI</type> <type>MULTI</type>
<fixed_in>3.0.2</fixed_in> <fixed_in>3.0.2</fixed_in>
</vulnerability> </vulnerability>
@@ -4811,10 +4846,11 @@
<plugin name="underconstruction"> <plugin name="underconstruction">
<vulnerability> <vulnerability>
<title>CSRF in WordPress underConstruction plugin (CVE-2013-2699)</title> <title>CSRF in WordPress underConstruction plugin</title>
<reference>http://wordpress.org/plugins/underconstruction/changelog/</reference> <reference>http://wordpress.org/plugins/underconstruction/changelog/</reference>
<reference>http://secunia.com/advisories/52881/</reference> <reference>http://secunia.com/advisories/52881/</reference>
<reference>http://osvdb.org/93857</reference> <reference>http://osvdb.org/93857</reference>
<cve>2013-2699</cve>
<type>CSRF</type> <type>CSRF</type>
<fixed_in>1.09</fixed_in> <fixed_in>1.09</fixed_in>
</vulnerability> </vulnerability>
@@ -4971,16 +5007,18 @@
<plugin name="xorbin-analog-flash-clock"> <plugin name="xorbin-analog-flash-clock">
<vulnerability> <vulnerability>
<title>CVE-2013-4692: Xorbin Analog Flash Clock 1.0 Flash-based XSS</title> <title>Xorbin Analog Flash Clock 1.0 Flash-based XSS</title>
<reference>http://advisory.prakharprasad.com/xorbin_afc_wp.txt</reference> <reference>http://advisory.prakharprasad.com/xorbin_afc_wp.txt</reference>
<cve>2013-4692</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
<plugin name="xorbin-digital-flash-clock"> <plugin name="xorbin-digital-flash-clock">
<vulnerability> <vulnerability>
<title>CVE-2013-4693: Xorbin Digital Flash Clock 1.0 Flash-based XSS</title> <title>Xorbin Digital Flash Clock 1.0 Flash-based XSS</title>
<reference>http://advisory.prakharprasad.com/xorbin_dfc_wp.txt</reference> <reference>http://advisory.prakharprasad.com/xorbin_dfc_wp.txt</reference>
<cve>2013-4693</cve>
<type>XSS</type> <type>XSS</type>
</vulnerability> </vulnerability>
</plugin> </plugin>
@@ -5020,8 +5058,9 @@
<plugin name="duplicator"> <plugin name="duplicator">
<vulnerability> <vulnerability>
<title>CVE-2013-4625: Duplicator installer.cleanup.php package Parameter XSS</title> <title>Duplicator installer.cleanup.php package Parameter XSS</title>
<reference>http://osvdb.org/95627</reference> <reference>http://osvdb.org/95627</reference>
<cve>2013-4625</cve>
<type>XSS</type> <type>XSS</type>
<fixed_in>0.4.5</fixed_in> <fixed_in>0.4.5</fixed_in>
</vulnerability> </vulnerability>
@@ -5056,8 +5095,9 @@
<plugin name="xhanch-my-twitter"> <plugin name="xhanch-my-twitter">
<vulnerability> <vulnerability>
<title>CVE-2013-3253: CSRF in admin/setting.php in Xhanch</title> <title>CSRF in admin/setting.php in Xhanch</title>
<reference>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-3253</reference> <reference>http://secunia.com/advisories/53133</reference>
<cve>2013-3253</cve>
<type>CSRF</type> <type>CSRF</type>
<fixed_in>2.7.7</fixed_in> <fixed_in>2.7.7</fixed_in>
</vulnerability> </vulnerability>
@@ -5065,8 +5105,9 @@
<plugin name="sexybookmarks"> <plugin name="sexybookmarks">
<vulnerability> <vulnerability>
<title>CVE-2013-3256: CSRF in sexybookmarks</title> <title>CSRF in sexybookmarks</title>
<reference>http://wordpress.org/plugins/sexybookmarks/changelog/</reference> <reference>http://wordpress.org/plugins/sexybookmarks/changelog/</reference>
<cve>2013-3256</cve>
<type>CSRF</type> <type>CSRF</type>
<fixed_in>6.1.5.0</fixed_in> <fixed_in>6.1.5.0</fixed_in>
</vulnerability> </vulnerability>

View File

@@ -52,6 +52,7 @@
<xs:element name="title" type="stringtype"/> <xs:element name="title" type="stringtype"/>
<xs:element name="reference" type="uritype" maxOccurs="unbounded" minOccurs="1"/> <xs:element name="reference" type="uritype" maxOccurs="unbounded" minOccurs="1"/>
<xs:element name="metasploit" type="stringtype" maxOccurs="unbounded" minOccurs="0"/> <xs:element name="metasploit" type="stringtype" maxOccurs="unbounded" minOccurs="0"/>
<xs:element name="cve" type="stringtype" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="type" type="typetype"/> <xs:element name="type" type="typetype"/>
<xs:element name="fixed_in" type="stringtype" minOccurs="0" maxOccurs="1"/> <xs:element name="fixed_in" type="stringtype" minOccurs="0" maxOccurs="1"/>
</xs:sequence> </xs:sequence>

View File

@@ -5,22 +5,24 @@ require 'vulnerability/output'
class Vulnerability class Vulnerability
include Vulnerability::Output include Vulnerability::Output
attr_accessor :title, :references, :type, :fixed_in, :metasploit_modules attr_accessor :title, :references, :type, :fixed_in, :metasploit_modules, :cve
# #
# @param [ String ] title The title of the vulnerability # @param [ String ] title The title of the vulnerability
# @param [ String ] type The type of the vulnerability # @param [ String ] type The type of the vulnerability
# @param [ Array ] references References urls # @param [ Array ] references References urls
# @param [ Array ] metasploit_modules Metasploit modules for the vulnerability # @param [ Array ] metasploit_modules Metasploit modules for the vulnerability
# @param [ String ] fixed_in Vuln fixed in Version X # @param [ String ] fixed_in Vuln fixed in Version X
# @param [ Array ] cve CVE numbers for the vulnerability
# #
# @return [ Vulnerability ] # @return [ Vulnerability ]
def initialize(title, type, references, metasploit_modules = [], fixed_in = '') def initialize(title, type, references, metasploit_modules = [], fixed_in = '', cve = [])
@title = title @title = title
@type = type @type = type
@references = references @references = references
@metasploit_modules = metasploit_modules @metasploit_modules = metasploit_modules
@fixed_in = fixed_in @fixed_in = fixed_in
@cve = cve
end end
# @param [ Vulnerability ] other # @param [ Vulnerability ] other
@@ -32,6 +34,7 @@ class Vulnerability
type == other.type && type == other.type &&
references == other.references && references == other.references &&
fixed_in == other.fixed_in && fixed_in == other.fixed_in &&
cve == other.cve &&
metasploit_modules == other.metasploit_modules metasploit_modules == other.metasploit_modules
end end
# :nocov: # :nocov:
@@ -47,7 +50,8 @@ class Vulnerability
xml_node.search('type').text, xml_node.search('type').text,
xml_node.search('reference').map(&:text), xml_node.search('reference').map(&:text),
xml_node.search('metasploit').map(&:text), xml_node.search('metasploit').map(&:text),
xml_node.search('fixed_in').text xml_node.search('fixed_in').text,
xml_node.search('cve').map(&:text)
) )
end end

View File

@@ -10,6 +10,9 @@ class Vulnerability
references.each do |r| references.each do |r|
puts ' | ' + red("* Reference: #{r}") puts ' | ' + red("* Reference: #{r}")
end end
cve.each do |c|
puts ' | ' + red("* CVE-#{c} - #{Output.cve_url(c)}")
end
metasploit_modules.each do |m| metasploit_modules.each do |m|
puts ' | ' + red("* Metasploit module: #{Output.metasploit_module_url(m)}") puts ' | ' + red("* Metasploit module: #{Output.metasploit_module_url(m)}")
end end
@@ -22,5 +25,9 @@ class Vulnerability
"http://www.metasploit.com/modules/#{module_path}" "http://www.metasploit.com/modules/#{module_path}"
end end
def self.cve_url(cve)
"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE#{cve}"
end
end end
end end

View File

@@ -19,7 +19,13 @@ describe Vulnerability::Output do
@module = 'gathering/yolo' @module = 'gathering/yolo'
@expected = modules_url + @module @expected = modules_url + @module
end end
end end
describe '::cve_url' do
it 'returns the correct url' do
Vulnerability::Output.cve_url('1111-1111').should == 'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1111-1111'
end
end
describe '#output' do describe '#output' do
# How to test it ? oO # How to test it ? oO

View File

@@ -18,6 +18,7 @@ describe Vulnerability do
its(:type) { should be type } its(:type) { should be type }
its(:metasploit_modules) { should be_empty } its(:metasploit_modules) { should be_empty }
its(:fixed_in) { should be_empty } its(:fixed_in) { should be_empty }
its(:cve) { should be_empty }
end end
context 'with metasploit modules argument' do context 'with metasploit modules argument' do
@@ -26,6 +27,7 @@ describe Vulnerability do
its(:metasploit_modules) { should be modules } its(:metasploit_modules) { should be modules }
its(:fixed_in) { should be_empty } its(:fixed_in) { should be_empty }
its(:cve) { should be_empty }
end end
context 'with metasploit modules and fixed version argument' do context 'with metasploit modules and fixed version argument' do
@@ -33,8 +35,19 @@ describe Vulnerability do
let(:fixed_version) { '1.0' } let(:fixed_version) { '1.0' }
its(:metasploit_modules) { should be modules } its(:metasploit_modules) { should be modules }
its(:fixed_in) { should == '1.0' } its(:fixed_in) { should == '1.0' }
its(:cve) { should be_empty }
end end
context 'with cve argument' do
subject(:vulnerability) { Vulnerability.new(title, type, references, [], '', cve) }
let(:cve) { %w{2011-001 2011-002} }
its(:metasploit_modules) { should be_empty }
its(:fixed_in) { should be_empty }
its(:cve) { should be cve }
end
end end
describe '::load_from_xml_node' do describe '::load_from_xml_node' do
@@ -47,6 +60,7 @@ describe Vulnerability do
its(:type) { should == 'CSRF' } its(:type) { should == 'CSRF' }
its(:references) { should == ['Ref 1', 'Ref 2'] } its(:references) { should == ['Ref 1', 'Ref 2'] }
its(:metasploit_modules) { should == %w{exploit/ex1} } its(:metasploit_modules) { should == %w{exploit/ex1} }
its(:cve) { should == %w{2011-001} }
its(:fixed_in) { should == '1.0'} its(:fixed_in) { should == '1.0'}
end end

View File

@@ -2,6 +2,7 @@
<title>Vuln Title</title> <title>Vuln Title</title>
<reference>Ref 1</reference> <reference>Ref 1</reference>
<reference>Ref 2</reference> <reference>Ref 2</reference>
<cve>2011-001</cve>
<type>CSRF</type> <type>CSRF</type>
<metasploit>exploit/ex1</metasploit> <metasploit>exploit/ex1</metasploit>
<fixed_in>1.0</fixed_in> <fixed_in>1.0</fixed_in>