exploit-db-mirror/exploits/php/webapps/16989.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

34 lines
No EOL
1.1 KiB
Text

Source: http://packetstormsecurity.org/files/view/99362/b2evolution403-xss.txt
------------------------------------------------------------------------
Software................b2evolution 4.0.3
Vulnerability...........Persistent Cross-site Scripting
Threat Level............Moderate (2/5)
Download................http://b2evolution.net/
Vendor Contact Date.....3/15/2011
Disclosure Date.........3/15/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <john@autosectools.com>
------------------------------------------------------------------------
--Description--
A persistent cross-site scripting vulnerability in b2evolution 4.0.3
can be exploited to execute arbitrary JavaScript.
--Exploit--
Data submitted to the "Comment text" input of the blog comment form is
not properly santized. As a result, javascript can be executed
throughout the application (admin dashboard, admin comment full text
view, possibly other pages).
--PoC--
<?<a><script>alert(0)</script>