exploit-db-mirror/exploits/php/webapps/51831.txt
Exploit-DB 59f10b7f45 DB: 2024-02-29
13 changes to exploits/shellcodes/ghdb

Saflok - Key Derication Function Exploit

(shellcode) Linux-x64 - create a shell with execve() sending argument using XOR (/bin//sh) [55 bytes]

Academy LMS 6.2 - Reflected XSS

Blood Bank v1.0 - Multiple SQL Injection

Moodle 4.3 - Reflected XSS

TASKHUB-2.8.8 - XSS-Reflected

WordPress Plugin Admin Bar & Dashboard Access Control Version: 1.2.8 - _Dashboard Redirect_ field Stored Cross-Site Scripting (XSS)
WP Fastest Cache 1.2.2 - Unauthenticated SQL Injection
WP Rocket < 2.10.3 - Local File Inclusion (LFI)
2024-02-29 00:16:26 +00:00

22 lines
No EOL
910 B
Text
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Exploit Title:  WordPress Plugin Admin Bar & Dashboard Access Control Version: 1.2.8 - "Dashboard Redirect" field  Stored Cross-Site Scripting (XSS)
# Google Dork: NA
# Date: 28/10/2023
# Exploit Author: Rachit Arora
# Vendor Homepage:
# Software Link:  https://wordpress.org/plugins/admin-bar-dashboard-control/
# Version: 1.2.8
# Category: Web Application
# Tested on: Windows
# CVE : 2023-47184
1. Install WordPress (latest)
2. Install and activate Admin Bar & Dashboard Access Control.
3. Navigate to "Admin Bar & Dash"  >> Under Dashboard Access and in the "Dashboard Redirect" enter the payload into the input field.
"onfocusin=alert``+autofocus>
"onfocusin=alert`document.domain`+autofocus>
4. You will observe that the payload successfully got stored  and when you are triggering the same functionality in that time JavaScript payload is executing successfully and we are getting a pop-up.