exploit-db-mirror/exploits/php/webapps/49196.txt
Offensive Security 045c2fe1ae DB: 2020-12-05
13 changes to exploits/shellcodes

IDT PC Audio 1.0.6499.0 - 'STacSV' Unquoted Service Path
Chromium 83 - Full CSP Bypass
Wordpress Plugin Canto 1.3.0 - Blind SSRF (Unauthenticated)
Composr CMS 10.0.34 - 'banners' Persistent Cross Site Scripting
Phpscript-sgh 0.1.0 - Time Based Blind SQL Injection
MiniCMS 1.10 - 'content box' Stored XSS
Testa Online Test Management System 3.4.7 - 'q' SQL Injection
Savsoft Quiz 5 - 'field_title' Stored Cross-Site Scripting
Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting
Laravel Nova 3.7.0 - 'range' DoS
CMS Made Simple 2.2.15 - Stored Cross-Site Scripting via SVG File Upload (Authenticated)
Zabbix 5.0.0 - Stored XSS via URL Widget Iframe
2020-12-05 05:01:54 +00:00

19 lines
No EOL
765 B
Text
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Exploit Title: Savsoft Quiz 5 - 'field_title' Stored Cross-Site Scripting
# Date: 2020-09-02
# Exploit Author: Dhruv Patel(dhruvp111296)
# Vendor Homepage: https://savsoftquiz.com/
# Software Link: https://github.com/savsofts/savsoftquiz_v5.git
# Version: 5.0
# Tested on: Windows 10
Attack vector:
This vulnerability can results attacker to inject the XSS payload in admin
panel Custom Field section. And Inject JavaScript Malicious code & Steal
Users cookie
Vulnerable Parameters: title
Steps for reproduce:
1. Go to admin panels add custom fields page
2. Fill the Title name as <script>alert("HELLO XSS")</script> payload in title.
3. Now Click on Save we can see our payload gets executed.
4. All Users Can Show our Payload As a xss.