DB: 2021-10-27
1 changes to exploits/shellcodes WordPress Plugin Filterable Portfolio Gallery 1.0 - 'title' Stored Cross-Site Scripting (XSS)
This commit is contained in:
parent
358c35770a
commit
e8bb2eb69f
2 changed files with 20 additions and 0 deletions
19
exploits/php/webapps/50458.txt
Normal file
19
exploits/php/webapps/50458.txt
Normal file
|
@ -0,0 +1,19 @@
|
|||
# Exploit Title: WordPress Plugin Filterable Portfolio Gallery 1.0 - 'title' Stored Cross-Site Scripting (XSS)
|
||||
# Date: 10/25/2021
|
||||
# Exploit Author: Murat DEMIRCI (@butterflyhunt3r)
|
||||
# Vendor Homepage: http://www.filterable-portfolio.com/
|
||||
# Software Link: https://wordpress.org/plugins/fg-gallery/
|
||||
# Version: 1.0
|
||||
# Tested on : Windows 10
|
||||
|
||||
#Poc:
|
||||
|
||||
1. Install Latest WordPress
|
||||
|
||||
2. Install and activate Filterable Portfolio Gallery 1.0
|
||||
|
||||
3. Open plugin on the left frame and enter JavaScript payload which is mentioned below into 'title' field, save and preview.
|
||||
|
||||
<img src=x onerror=alert(1)>
|
||||
|
||||
4. You will observe that the payload successfully got stored into the database and alert will be seen on the screen.
|
|
@ -44410,3 +44410,4 @@ id,file,description,date,author,type,platform,port
|
|||
50455,exploits/php/webapps/50455.txt,"WordPress Plugin Ninja Tables 4.1.7 - Stored Cross-Site Scripting (XSS)",1970-01-01,"Akash Patil",webapps,php,
|
||||
50456,exploits/php/webapps/50456.js,"Wordpress 4.9.6 - Arbitrary File Deletion (Authenticated) (2)",1970-01-01,samguy,webapps,php,
|
||||
50457,exploits/php/webapps/50457.py,"phpMyAdmin 4.8.1 - Remote Code Execution (RCE)",1970-01-01,samguy,webapps,php,
|
||||
50458,exploits/php/webapps/50458.txt,"WordPress Plugin Filterable Portfolio Gallery 1.0 - 'title' Stored Cross-Site Scripting (XSS)",1970-01-01,"Murat DEMİRCİ",webapps,php,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue