exploit-db-mirror/exploits/php/webapps/51572.txt
Exploit-DB e2ea5c0412 DB: 2023-07-07
4 changes to exploits/shellcodes/ghdb

Gila CMS 1.10.9 - Remote Code Execution (RCE) (Authenticated)

Lost and Found Information System v1.0 - SQL Injection

Piwigo v13.7.0 - Stored Cross-Site Scripting (XSS) (Authenticated)
2023-07-07 00:16:26 +00:00

15 lines
No EOL
741 B
Text
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

#Exploit Title: Piwigo v13.7.0 - Stored Cross-Site Scripting (XSS) (Authenticated)
#Date: 25 June 2023
#Exploit Author: Okan Kurtulus
#Vendor Homepage: https://piwigo.org
#Version: 13.7.0
#Tested on: Ubuntu 22.04
#CVE : N/A
# Proof of Concept:
1 Install the system through the website and log in with any user authorized to upload photos.
2 Click "Add" under "Photos" from the left menu. The photo you want to upload is selected and uploaded.
3 Click on the uploaded photo and the photo editing screen opens. XSS payload is entered in the "Description" section on this screen. After saving the file, go to the homepage and open the page with the photo. The XSS payload appears to be triggered.
#Payload
<sCriPt>alert(1);</sCriPt>