Webgrind 1.1 Cross Site Scripting

2015.05.23
Credit: John Page
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# Exploit Title: Webgrind XSS Exploit # Google Dork: intitle: XSS # Date: May 20, 2015 # Exploit Author: John Page (hyp3rlinx) # Website: hyp3rlinx.altervista.org # Vendor Homepage: github.com/jokkedk/webgrind # Software Link: github.com/jokkedk/webgrind # Version: Current release # Tested on: Windows 7 Firefox, IE using XAMPP # Category: XSS # CVE : NA Source: http://hyp3rlinx.altervista.org/advisories/AS-WEBGRIND0520.txt Product: Webgrind is a Xdebug Profiling Web Frontend in PHP. Advisory Information: ===================================================== Webgrind is vulnerable to cross site scripting attacks. Exploit code: ============== http://localhost/webgrind/index.php?op=fileviewer&file=%3Cscript%3Ealert('XSS hyp3rlinx')%3C/script%3E Disclosure Timeline: ================================== Vendor Notification May 19, 2015 May 20, 2015: Public Disclosure Severity Level: =============== Med Description: ============ Request Method(s): [+] GET Vulnerable Product: [+] Webgrind Vulnerable Parameter(s): [+] file=[XSS] Affected Area(s): [+] Current user. ============================== (hyp3rlinx)


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top