Exploit Joomla! Component Easydiscuss < 4.0.21 - Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
43488
Проверка EDB
  1. Пройдено
Автор
MATTIA FURLANI
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2018-5263
Дата публикации
2018-01-10
Joomla! Component Easydiscuss < 4.0.21 - Cross-Site Scripting
Код:
# Exploit Title: Joomla Plugin Easydiscuss <4.0.21 Persistent XSS in Edit Message
# Date: 06-01-2018
# Software Link: https://stackideas.com/easydiscuss
# Exploit Author: Mattia Furlani
# CVE: CVE-2018-5263
# Category: webapps

1. Description

Whenever a user edits a message with <\textarea> inside the body, everything after the <\textarea> will be executed in the user’s browser. Works with every version up to 4.0.20


2. Proof of Concept

Login with permissions to post a message, insert <\textarea> in the body and add any html code after that, whenever a user tries to edit that message the code writed after you closed the textarea will be executed


3. Solution:

Update to version 4.0.21
https://stackideas.com/blog/easydiscuss4021-update
 
Источник
www.exploit-db.com

Похожие темы