mailman v 2.1.8 reflected cross site scripting

2017.03.29
Credit: alqnas eslam
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# Exploit Title: mailman v 2.1.8 reflected cross site scripting # Date: 28-3-2017 # Exploit Author: alqnas eslam # Vendor Homepage:fb.com/alqnas4 # Software Link:http://www.list.org/ # Tested on:any os Poc: step1: go to mailman dir eg:example.com/mailman/listinfo step2: type your javascript or html code in input name (listname) step3: click on Search Advertised demo: university of cambridge - https://lists.cam.ac.uk/mailman/listinfo video Poc: mailman v 2.1.8 reflected cross site scripting https://www.youtube.com/watch?v=VZMVAe5a490&feature=youtu.be

References:

https://www.youtube.com/watch?v=VZMVAe5a490&feature=youtu.be


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top