exploit-db-mirror/exploits/php/webapps/50853.txt
Offensive Security 50cc2edafe DB: 2022-04-08
9 changes to exploits/shellcodes

Sherpa Connector Service v2020.2.20328.2050 - Unquoted Service Path
binutils 2.37 - Objdump Segmentation Fault
Kramer VIAware - Remote Code Execution (RCE) (Root)
Opmon 9.11 - Cross-site Scripting
Zenario CMS 9.0.54156 - Remote Code Execution (RCE) (Authenticated)
KLiK Social Media Website 1.0 - 'Multiple' SQLi
minewebcms 1.15.2 - Cross-site Scripting (XSS)
qdPM 9.2 - Cross-site Request Forgery (CSRF)
ICEHRM 31.0.0.0S - Cross-site Request Forgery (CSRF) to Account Deletion
2022-04-08 05:01:37 +00:00

24 lines
No EOL
971 B
Text

# Exploit Title: minewebcms 1.15.2 - Cross-site Scripting (XSS)
# Google Dork: NA
# Date: 02/20/2022
# Exploit Author: Chetanya Sharma @AggressiveUser
# Vendor Homepage: https://mineweb.org/
# Software Link: https://github.com/mineweb/minewebcms
# Version: 1.15.2
# Tested on: KALI OS
# CVE : CVE-2022-1163
#
---------------
Steps to Reproduce:-
=> Install the WebApp and Setup it
=> Login in to webAPP using Admin Creds.
=> Navigate to "http://localhost/MineWebCMS-1.15.2/admin/navbar"
=> Add/Edit a Link Select "Drop-Down Menu"
=> "Link Name" and "URL" Both Input are Vulnerable to Exploit Simple XSS
=> Payload : <script>alert(1);</script>
=> XSS will trigger on "http://localhost/MineWebCMS-1.15.2/" Aka WebApp HOME Page
Note : As you can see this simple payload working in those two inputs as normally . Whole WebApp Admin Input Structure is allow to do HTML Injection or XSS Injection
References: https://huntr.dev/bounties/44d40f34-c391-40c0-a517-12a2c0258149/