exploit-db-mirror/exploits/php/webapps/16196.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

19 lines
No EOL
760 B
Text

# Exploit Title: Eventum 2.3.1 stored XSS
# Date: 19-2-2011
# Author: Saif El-Sherei
# Software Link: https://code.launchpad.net/eventum
# Version: Eventum 2.3.1
# Tested on: FF 3.0.15, IE 8
# Vendor notification: vendor notified, awaiting response
Info:
Eventum is a user-friendly and flexible issue tracking system that can be used by a support department to track incoming technical support requests, or by a software development team to quickly organize tasks and bugs.
Details:
The "Full-Name" variable is not properly sanitized before displayed in any page. where an authorized user can perform this attack on other users who has access to the system, by changing his own "full-name" in the preferences section.
POC:
<script>alert('w00t');</script>