exploit-db-mirror/exploits/php/webapps/37659.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

30 lines
No EOL
856 B
Text
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# phpVibe < 4.20 Stored XSS
# Vendor Homepage: http://www.phpvibe.com
# Affected Versions: prior to 4.20
# Discovered by Filippos Mastrogiannis
# Twitter: @filipposmastro
# LinkedIn: https://www.linkedin.com/pub/filippos-mastrogiannis/68/132/177
-- Description --
This stored XSS vulnerability allows any logged in user
to inject malicious code in the comments section:
e.g. "><body onLoad=confirm("XSS")>
The vulnerability exists because the user input is not properly sanitized
and this can lead to malicious code injection that will be executed on the
targets browser
-- Proof of Concept --
1. The attacker posts a new comment which contains our payload:
"><body onLoad=confirm("XSS")>
2. The stored XSS can be triggered when any user visits the link of the
uploaded content
-- Solution --
The vendor has fixed the issue in the version 4.21