QUICK.CMS Cross site scripting

2019.06.17
Risk: Low
Local: Yes
Remote: Yes
CVE: N/A
CWE: N/A

######################################################################################### # Exploit Title : QUICK.CMS Cross site scripting # Google Dork : # Exploit Author: Mikayil Ilyas # Vendor Homepage: https://opensolution.org # Contact : mikayil.ilyasov@gmail.com # Software Link: https://opensolution.org/download/home.html?sFile=Quick.Cms_v6.6-en.zip # version : v6.6 # Date : 16.06.2019 # Tested on : Windows 10 , Kali Linux # CVE : ########################################################################################## + Exploit : log in admin panel (admin.php) and click to add new page. XSS payload write in "name" textarea. screnshoots 1 : https://i.hizliresim.com/JVX0mJ.png 2 : https://i.hizliresim.com/OrkGm4.png


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top