exploit-db-mirror/exploits/php/webapps/52043.txt
Exploit-DB 1064b5c455 DB: 2024-06-15
12 changes to exploits/shellcodes/ghdb

Zyxel IKE Packet Decoder - Unauthenticated Remote Code Execution (Metasploit)

Rebar3 3.13.2 - Command Injection
AEGON LIFE v1.0 Life Insurance Management System - SQL injection vulnerability.
AEGON LIFE v1.0 Life Insurance Management System - Stored cross-site scripting (XSS)
AEGON LIFE v1.0 Life Insurance Management System - Unauthenticated Remote Code Execution (RCE)

Boelter Blue System Management 1.3 - SQL Injection

Carbon Forum 5.9.0 - Stored XSS

PHP < 8.3.8 - Remote Code Execution (Unauthenticated) (Windows)

WP-UserOnline 2.88.0 - Stored Cross Site Scripting (XSS) (Authenticated)

XMB 1.9.12.06 - Stored XSS

ZwiiCMS 12.2.04 - Remote Code Execution (Authenticated)
2024-06-15 00:16:21 +00:00

29 lines
No EOL
1 KiB
Text

# Exploit Title: Persistent XSS in Carbon Forum 5.9.0 (Stored)
# Date: 06/12/2024
# Exploit Author: Chokri Hammedi
# Vendor Homepage: https://www.94cb.com/
# Software Link: https://github.com/lincanbin/Carbon-Forum
# Version: 5.9.0
# Tested on: Windows XP
# CVE: N/A
## Vulnerability Details
A persistent (stored) XSS vulnerability was discovered in Carbon Forum
version 5.9.0. The vulnerability allows an attacker to inject malicious
JavaScript code into the Forum Name field under the admin settings. This
payload is stored on the server and executed in the browser of any user who
visits the forum, leading to potential session hijacking, data theft, and
other malicious activities.
## Steps to Reproduce
1. Login as Admin: Access the Carbon Forum with admin privileges.
2. Navigate to Settings: Go to the '/dashboard' and select the Basic
section.
3. Enter Payload : Input the following payload in the Forum Name field:
<script>alert('XSS');</script>
4. Save Settings: Save the changes.
5. The xss payload will triggers