- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 18974
- Проверка EDB
-
- Пройдено
- Автор
- HENRY HOGGARD
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- null
- Дата публикации
- 2012-06-02
Код:
# Title: Vanilla Tagging Enchanced 1.0.1 Stored XSS
# Date: 1/6/12
# Author: Henry Hoggard
# Author URL: henryhoggard.co.uk
# Author Twitter: @henryhoggard
# Software: Vanilla Version 2.0.18.4 + Tagging Enhanced plugin 1.0.1
# http://vanillaforums.org/download
# http://vanillaforums.org/addon/tagging-plugin
This plugin is based on the default tagging plugin that comes with Vanilla. Therefore this is vulnerable to the same attack.
Create a new thread and post your XSS as tag. I used
<script>alert('xss')</script>
You will have to use a proxy / manipulate the form to bypass the max-length on the form.
Once you have posted the thread, send an administrator or moderator to
http://target.tld/index.php?p=/vanilla/post/editdiscussion/7
Where 7 is the thread ID of the thread you just made. The XSS will then trigger.
You can even use a URL shortener to send the link.
Note: The URL may be different depending on what category your thread is in.
#############################################################
- Источник
- www.exploit-db.com