Exploit Vanilla Forum Tagging Plugin Enchanced 1.0.1 - Persistent Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
18974
Проверка EDB
  1. Пройдено
Автор
HENRY HOGGARD
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
null
Дата публикации
2012-06-02
Код:
# Title: Vanilla Tagging Enchanced 1.0.1 Stored XSS
# Date: 1/6/12
# Author: Henry Hoggard
# Author URL: henryhoggard.co.uk
# Author Twitter: @henryhoggard
# Software: Vanilla Version 2.0.18.4 + Tagging Enhanced plugin 1.0.1
# http://vanillaforums.org/download
# http://vanillaforums.org/addon/tagging-plugin

This plugin is based on the default tagging plugin that comes with Vanilla. Therefore this is vulnerable to the same attack.

Create a new thread and post your XSS as tag. I used
<script>alert('xss')</script>

You will have to use a proxy / manipulate the form to bypass the max-length on the form.

Once you have posted the thread, send an administrator or moderator to

http://target.tld/index.php?p=/vanilla/post/editdiscussion/7

Where 7 is the thread ID of the thread you just made. The XSS will then trigger.
You can even use a URL shortener to send the link.

Note: The URL may be different depending on what category your thread is in.

#############################################################
 
Источник
www.exploit-db.com

Похожие темы