
22 changes to exploits/shellcodes/ghdb LISTSERV 17 - Insecure Direct Object Reference (IDOR) LISTSERV 17 - Reflected Cross Site Scripting (XSS) Router ZTE-H108NS - Stack Buffer Overflow (DoS) Router ZTE-H108NS - Authentication Bypass Boa Web Server v0.94.14 - Authentication Bypass Covenant v0.5 - Remote Code Execution (RCE) Dreamer CMS v4.0.0 - SQL Injection Shoplazza 1.1 - Stored Cross-Site Scripting (XSS) Virtual Reception v1.0 - Web Server Directory Traversal 4images 1.9 - Remote Command Execution (RCE) ClicShopping v3.402 - Cross-Site Scripting (XSS) Concrete5 CME v9.1.3 - Xpath injection Device Manager Express 7.8.20002.47752 - Remote Code Execution (RCE) Ecommerse v1.0 - Cross-Site Scripting (XSS) Eve-ng 5.0.1-13 - Stored Cross-Site Scripting (XSS) myBB forums 1.8.26 - Stored Cross-Site Scripting (XSS) WPForms 1.7.8 - Cross-Site Scripting (XSS) CrowdStrike Falcon AGENT 6.44.15806 - Uninstall without Installation Token Lavasoft web companion 4.1.0.409 - 'DCIservice' Unquoted Service Path Zillya Total Security 3.0.2367.0 - Local Privilege Escalation
20 lines
No EOL
939 B
Text
20 lines
No EOL
939 B
Text
# Exploit Title: LISTSERV 17 - Reflected Cross Site Scripting (XSS)
|
|
# Google Dork: inurl:/scripts/wa.exe
|
|
# Date: 12/01/2022
|
|
# Exploit Author: Shaunt Der-Grigorian
|
|
# Vendor Homepage: https://www.lsoft.com/
|
|
# Software Link: https://www.lsoft.com/download/listserv.asp
|
|
# Version: 17
|
|
# Tested on: Windows Server 2019
|
|
# CVE : CVE-2022-39195
|
|
|
|
A reflected cross-site scripting (XSS) vulnerability in the LISTSERV 17 web interface allows remote attackers to inject arbitrary JavaScript or HTML via the "c" parameter.
|
|
|
|
To reproduce, please visit
|
|
http://localhost/scripts/wa.exe?TICKET=test&c=%3Cscript%3Ealert(1)%3C/script%3E
|
|
(or whichever URL you can use for testing instead of localhost).
|
|
|
|
The "c" parameter will reflect any value given onto the page.
|
|
|
|
# Solution
|
|
This vulnerability can be mitigated by going under "Server Administration" to "Web Templates" and editing the BODY-LCMD-MESSAGE web template. Change &+CMD; to &+HTMLENCODE(&+CMD;); . |