exploit-db-mirror/platforms/php/webapps/35659.txt
Offensive Security 406b1feedc Update: 2015-01-01
15 new exploits
2015-01-01 08:39:22 +00:00

19 lines
558 B
Text
Executable file

# Exploit Title: Social Microblogging PRO 1.5 Stored XSS Vulnerability
# Date: 29-12-2014
# Exploit Author: Halil Dalabasmaz
# Version: v1.5
# Vendor Homepage:
http://codecanyon.net/item/social-microblogging-pro/9217005
# Tested on: Chrome & Iceweasel
# Vulnerability Description:
===Stored XSS===
"Web Site" input is not secure at Profile section. You can run XSS payloads
on "Web Site" input.
Sample Payload for Stored XSS: http://example.com/">[xssPayload]
=Solution=
Filter the input field against to XSS attacks.
================