
13 changes to exploits/shellcodes IDT PC Audio 1.0.6499.0 - 'STacSV' Unquoted Service Path Chromium 83 - Full CSP Bypass Wordpress Plugin Canto 1.3.0 - Blind SSRF (Unauthenticated) Composr CMS 10.0.34 - 'banners' Persistent Cross Site Scripting Phpscript-sgh 0.1.0 - Time Based Blind SQL Injection MiniCMS 1.10 - 'content box' Stored XSS Testa Online Test Management System 3.4.7 - 'q' SQL Injection Savsoft Quiz 5 - 'field_title' Stored Cross-Site Scripting Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting Laravel Nova 3.7.0 - 'range' DoS CMS Made Simple 2.2.15 - Stored Cross-Site Scripting via SVG File Upload (Authenticated) Zabbix 5.0.0 - Stored XSS via URL Widget Iframe
19 lines
No EOL
765 B
Text
19 lines
No EOL
765 B
Text
# Exploit Title: Savsoft Quiz 5 - 'field_title' Stored Cross-Site Scripting
|
||
# Date: 2020-09-02
|
||
# Exploit Author: Dhruv Patel(dhruvp111296)
|
||
# Vendor Homepage: https://savsoftquiz.com/
|
||
# Software Link: https://github.com/savsofts/savsoftquiz_v5.git
|
||
# Version: 5.0
|
||
# Tested on: Windows 10
|
||
|
||
Attack vector:
|
||
This vulnerability can results attacker to inject the XSS payload in admin
|
||
panel Custom Field section. And Inject JavaScript Malicious code & Steal
|
||
User’s cookie
|
||
|
||
Vulnerable Parameters: title
|
||
Steps for reproduce:
|
||
1. Go to admin panel’s add custom fields page
|
||
2. Fill the Title name as <script>alert("HELLO XSS")</script> payload in title.
|
||
3. Now Click on Save we can see our payload gets executed.
|
||
4. All Users Can Show our Payload As a xss. |