
15 changes to exploits/shellcodes Queue Management System 4.0.0 - _Add User_ Stored XSS Spotweb 1.4.9 - 'search' SQL Injection Academy-LMS 4.3 - Stored XSS Spiceworks 7.5 - HTTP Header Injection Wordpress Plugin Contact Form 7 5.3.1 - Unrestricted File Upload SCO Openserver 5.0.7 - 'section' Reflected XSS SCO Openserver 5.0.7 - 'outputform' Command Injection Flexmonster Pivot Table & Charts 2.7.17 - 'Remote Report' Reflected XSS Flexmonster Pivot Table & Charts 2.7.17 - 'To OLAP' Reflected XSS Flexmonster Pivot Table & Charts 2.7.17 - 'To remote CSV' Reflected XSS Flexmonster Pivot Table & Charts 2.7.17 - 'Remote JSON' Reflected XSS Point of Sale System 1.0 - Multiple Stored XSS Online Marriage Registration System 1.0 - 'searchdata' SQL Injection Sony Playstation 4 (PS4) < 6.72 - 'ValidationMessage::buildBubbleTree()' Use-After-Free WebKit Code Execution (PoC) Sony Playstation 4 (PS4) < 7.02 - 'ValidationMessage::buildBubbleTree()' Use-After-Free WebKit Code Execution (PoC)
20 lines
No EOL
644 B
Text
20 lines
No EOL
644 B
Text
# Exploit Title: Queue Management System 4.0.0 - "Add User" Stored XSS
|
|
|
|
# Exploit Author: Kislay Kumar
|
|
# Date: 2020-12-21
|
|
# Google Dork: N/A
|
|
# Vendor Homepage: http://codekernel.net/
|
|
# Software Link: https://codecanyon.net/item/queue-management-system/22029961
|
|
# Affected Version: Version 4.0.0
|
|
# Patched Version: Unpatched
|
|
# Category: Web Application
|
|
# Tested on: Kali Linux
|
|
|
|
Step 1. Login as admin.
|
|
|
|
Step 2. Select "Users" from menu and click on "Add User .
|
|
|
|
Step 3. Insert payload - "><svg/onload=alert(1)> in "Firtst Name" , " Last
|
|
Name "and " Email ".
|
|
|
|
Step 4. Now open "User List " from menu and you will get alert box. |