Persian Link cms Stored xss vulnerability

2018.01.30
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

[+] Exploit Title ; Persian Link cms Stored xss vulnerability [+] Date : 2018-01-30 [+] Author : 0P3N3R From IRANIAN ETHICAL HACKERS [+] Version : 2.1 [+] Vendor Homepage : http://mahdiy.ir/ [+] Dork : intext:" Powered By Persian Link CMS - Design By MahdiY " [+] Forum : irethicalhackers.com/forums [+] Tested On : windows 10 - kali linux 2.0 [+] Contact : https://telegram.me/WebServer [+] Description : [!] persian link cms Is a link box And Users can submit any sites link [+] Poc : [+] Stored XSS Vulnerability : [!] Go to submit new link And insert payload on link title and link description. [!] now if admin go to the admin panel , he see your payload alert [*] Payload : <script>alert('0P3N3R')</script> [+] Security Level : [!] medium [+] Exploitation Technique: [!] Remote [+] Vulnerability Files : [*] send.php [+] Fix : [!] Restrict user input or replace bad characters or use htmlspecialchars and htmlentities [+] Target : [!] http://mordegan.ir/link-6.html [!] http://ecoto.ir/web/ [!] http://myrss.hol.es/ [!] http://linkdoni.mehrresane.ir/ [+] We Are : [+] 0P3N3R [+] Mehrdad_Ice [+] BaxTurk24 [+] S0hp [+] ERROR1067


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top