
21 changes to exploits/shellcodes ServersCheck Monitoring Software 14.3.3 - Denial of Service (PoC) BORGChat 1.0.0 build 438 - Denial of Service (PoC) libtiff 4.0.9 - Decodes Arbitrarily Sized JBIG into a Target Buffer Adult Filter 1.0 - Buffer Overflow (SEH) WebEx - Local Service Permissions Exploit (Metasploit) exim 4.90 - Remote Code Execution ServersCheck Monitoring Software 14.3.3 - Arbitrary File Write exim 4.90 - Remote Code Execution WebExec - Authenticated User Code Execution (Metasploit) ProjeQtOr Project Management Tool 7.2.5 - Remote Code Execution Ekushey Project Manager CRM 3.1 - Cross-Site Scripting phptpoint Pharmacy Management System 1.0 - 'username' SQL injection phptpoint Hospital Management System 1.0 - 'user' SQL injection Simple Chat System 1.0 - 'id' SQL Injection Delta Sql 1.8.2 - Arbitrary File Upload User Management 1.1 - Cross-Site Scripting ClipBucket 2.8 - 'id' SQL Injection Simple POS and Inventory 1.0 - 'cat' SQL Injection AiOPMSD Final 1.0.0 - 'q' SQL Injection AjentiCP 1.2.23.13 - Cross-Site Scripting MPS Box 0.1.8.0 - 'uuid' SQL Injection Open STA Manager 2.3 - Arbitrary File Download
21 lines
No EOL
871 B
Text
21 lines
No EOL
871 B
Text
# Title: AjentiCP 1.2.23.13 - Cross-Site Scripting
|
|
# Author: Numan OZDEMIR (https://infinitumit.com.tr)
|
|
# Vendor Homepage: ajenti.org
|
|
# Software Link: https://github.com/ajenti/ajenti
|
|
# Version: Up to v1.2.23.13
|
|
# CVE: CVE-2018-18548
|
|
|
|
# Description:
|
|
|
|
# Attacker can inject JavaScript codes without Ajenti privileges by this
|
|
# vulnerabillity.
|
|
# Normally an attacker cant intervene to Ajenti without Ajenti privileges.
|
|
# But with this vulnerability, if attacker can create a folder (may be by
|
|
# a web app vulnerability) he can run
|
|
# bad-purposed JavaScript codes on Ajenti user's browser, while the user
|
|
# using File Manager tool.
|
|
# So this vulnerability makes high risk.
|
|
|
|
# How to Reproduce:
|
|
1)- Create a directory as named xss payload. Like, im<img src onerror=alert(1337)>dir
|
|
2)- Open this directory in File Manager tool in Ajenti server admin panel. |