
8 new exploits WordPress Q and A (Focus Plus) FAQ Plugin 1.3.9.7 - Multiple Vulnerabilities WordPress Huge-IT Image Gallery Plugin 1.8.9 - Multiple Vulnerabilities Codoforum 3.4 - Stored Cross-Site Scripting MediaCoder 0.8.43.5830 - .m3u Buffer Overflow SEH Exploit VUPlayer 2.49 - .m3u Buffer Overflow Exploit (Win 7 DEP Bypass) Core FTP LE 2.2 - Path Field Local Buffer Overflow OPAC KpwinSQL - Multiple Vulnerabilities GE Proficy HMI/SCADA CIMPLICITY 8.2 - Local Privilege Escalation
31 lines
945 B
Text
Executable file
31 lines
945 B
Text
Executable file
# Exploit Title: Codoforum v3.4 Stored Cross-Site Scripting (Stored XSS)
|
|
# Google Dork: intext:"powered by codoforum"
|
|
# Date: 01/06/2016
|
|
# Exploit Author: Ahmed Sherif (OffensiveBits)
|
|
# Vendor Homepage: http://codologic.com/page/
|
|
# Software Link: http://codoforum.com/index.php
|
|
# Version: V3.4
|
|
# Tested on: Linux Mint
|
|
|
|
|
|
1. Description:
|
|
|
|
The Reply and search functionalities are both vulnerable to Stored XSS due
|
|
to improper filtration in displaying the content of replies.
|
|
|
|
|
|
2. Steps to reproduce the vulnerability:
|
|
|
|
|
|
1. Login to your account.
|
|
2. look for any topic and add a reply .
|
|
3. in the reply textbox add a widely used common keyword within xss
|
|
payload for example : (keyword"><svg/onload=prompt(document.cookie)>)
|
|
4. while any user surfing the topic and started to search for specific
|
|
keywords the javascript code will be executed.
|
|
|
|
|
|
|
|
3. Solution:
|
|
|
|
The new version of codoforum will be released this week.
|