
12 changes to exploits/shellcodes/ghdb Zyxel IKE Packet Decoder - Unauthenticated Remote Code Execution (Metasploit) Rebar3 3.13.2 - Command Injection AEGON LIFE v1.0 Life Insurance Management System - SQL injection vulnerability. AEGON LIFE v1.0 Life Insurance Management System - Stored cross-site scripting (XSS) AEGON LIFE v1.0 Life Insurance Management System - Unauthenticated Remote Code Execution (RCE) Boelter Blue System Management 1.3 - SQL Injection Carbon Forum 5.9.0 - Stored XSS PHP < 8.3.8 - Remote Code Execution (Unauthenticated) (Windows) WP-UserOnline 2.88.0 - Stored Cross Site Scripting (XSS) (Authenticated) XMB 1.9.12.06 - Stored XSS ZwiiCMS 12.2.04 - Remote Code Execution (Authenticated)
29 lines
No EOL
1 KiB
Text
29 lines
No EOL
1 KiB
Text
# Exploit Title: Persistent XSS in Carbon Forum 5.9.0 (Stored)
|
|
# Date: 06/12/2024
|
|
# Exploit Author: Chokri Hammedi
|
|
# Vendor Homepage: https://www.94cb.com/
|
|
# Software Link: https://github.com/lincanbin/Carbon-Forum
|
|
# Version: 5.9.0
|
|
# Tested on: Windows XP
|
|
# CVE: N/A
|
|
|
|
## Vulnerability Details
|
|
|
|
A persistent (stored) XSS vulnerability was discovered in Carbon Forum
|
|
version 5.9.0. The vulnerability allows an attacker to inject malicious
|
|
JavaScript code into the Forum Name field under the admin settings. This
|
|
payload is stored on the server and executed in the browser of any user who
|
|
visits the forum, leading to potential session hijacking, data theft, and
|
|
other malicious activities.
|
|
|
|
## Steps to Reproduce
|
|
|
|
1. Login as Admin: Access the Carbon Forum with admin privileges.
|
|
2. Navigate to Settings: Go to the '/dashboard' and select the Basic
|
|
section.
|
|
3. Enter Payload : Input the following payload in the Forum Name field:
|
|
|
|
<script>alert('XSS');</script>
|
|
|
|
4. Save Settings: Save the changes.
|
|
5. The xss payload will triggers |