DB: 2021-05-26
2 changes to exploits/shellcodes Gadget Works Online Ordering System 1.0 - 'Category' Persistent Cross-Site Scripting (XSS) WordPress Plugin Cookie Law Bar 1.2.1 - 'clb_bar_msg' Stored Cross-Site Scripting (XSS)
This commit is contained in:
parent
bd9f3cd966
commit
8ceb48a8ee
3 changed files with 49 additions and 0 deletions
28
exploits/php/webapps/49904.txt
Normal file
28
exploits/php/webapps/49904.txt
Normal file
|
@ -0,0 +1,28 @@
|
|||
# Exploit Title: Gadget Works Online Ordering System 1.0 - 'Category' Persistent Cross-Site Scripting (XSS)
|
||||
# Date: 24-05-2021
|
||||
# Exploit Author: Vinay H C
|
||||
# Vendor Homepage: https://www.sourcecodester.com/
|
||||
# Software Link: https://www.sourcecodester.com/php/13093/gadget-works-online-ordering-system-phpmysqli.html
|
||||
# Version: 1.0
|
||||
# Tested on: Windows 10/XAMPP
|
||||
|
||||
Stored Cross-site scripting(XSS):
|
||||
Stored XSS, also known as persistent XSS, is the more damaging of the two. It occurs when a malicious script is injected directly into a vulnerable web application.
|
||||
|
||||
Attack Vector :
|
||||
|
||||
This vulnerability can result in the attacker to inject the XSS payload in the add Category field of the page and each time any user will open the website, the XSS triggers and attacker can able to steal the cookie according to the crafted payload.
|
||||
|
||||
Vulnerable Parameters: +New==>Category input field.
|
||||
|
||||
Payload : <script>alert(document.domain)</script>
|
||||
|
||||
Vulnerable URL :
|
||||
http://localhost/philosophy/admin/category/index.php?view=add
|
||||
|
||||
Steps To Reproduce :
|
||||
1) Go to the admin Dashboard
|
||||
2) Click on New and select Category..
|
||||
3) Put Payload into the 'Add Category' parameter.
|
||||
4) Click on Save.
|
||||
5) XSS payload will be triggered.
|
19
exploits/php/webapps/49905.txt
Normal file
19
exploits/php/webapps/49905.txt
Normal file
|
@ -0,0 +1,19 @@
|
|||
# Exploit Title: WordPress Plugin Cookie Law Bar 1.2.1 - 'clb_bar_msg' Stored Cross-Site Scripting (XSS)
|
||||
# Date: 2021-05-24
|
||||
# Exploit Author: Mesut Cetin
|
||||
# Vendor Homepage: https://www.cookielawinfo.com/wordpress-plugin/
|
||||
# Software Link: https://wordpress.org/plugins/cookie-law-bar/
|
||||
# Version: 1.2.1
|
||||
# Tested on: Ubuntu 16.04 LTS, Wordpress 5.7.2
|
||||
|
||||
# the "Bar Message" text field is vulnerable to stored XSS due to unsanitized user input
|
||||
# an authenticated attacker can retrieve cookies / sensitive data of all Wordpress users
|
||||
|
||||
# proof of concept
|
||||
# navigate to the settings of the Cookie Law Bar under
|
||||
|
||||
http://localhost/wp-admin/options-general.php?page=clb
|
||||
|
||||
# inject the payload: </script><script>alert(document.cookie)</script> into the "Bar Message field" and save it
|
||||
|
||||
# browsing through the Wordpress pages shows the cookies
|
|
@ -44067,3 +44067,5 @@ id,file,description,date,author,type,platform,port
|
|||
49901,exploits/java/webapps/49901.txt,"Shopizer 2.16.0 - 'Multiple' Cross-Site Scripting (XSS)",2021-05-24,"Marek Toth",webapps,java,
|
||||
49902,exploits/multiple/webapps/49902.py,"Codiad 2.8.4 - Remote Code Execution (Authenticated) (2)",2021-05-24,"Ron Jost",webapps,multiple,
|
||||
49903,exploits/php/webapps/49903.txt,"WordPress Plugin ReDi Restaurant Reservation 21.0307 - 'Comment' Stored Cross-Site Scripting (XSS)",2021-05-24,"Bastijn Ouwendijk",webapps,php,
|
||||
49904,exploits/php/webapps/49904.txt,"Gadget Works Online Ordering System 1.0 - 'Category' Persistent Cross-Site Scripting (XSS)",2021-05-25,"Vinay H C",webapps,php,
|
||||
49905,exploits/php/webapps/49905.txt,"WordPress Plugin Cookie Law Bar 1.2.1 - 'clb_bar_msg' Stored Cross-Site Scripting (XSS)",2021-05-25,"Mesut Cetin",webapps,php,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue