Savsoft Quiz 5 - 'Skype ID' Stored XSS

2020.12.10
dz bilal .BVM (DZ) dz
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: Savsoft Quiz 5 - 'Skype ID' Stored XSS # Exploit Author: Dipak Panchal(th3.d1p4k) # Vendor Homepage: https://savsoftquiz.com # Software Link: https://github.com/savsofts/savsoftquiz_v5 # Version: 5 # Tested on Windows 10 Attack Vector: This vulnerability can results attacker to inject the XSS payload in User Registration section and each time admin visits the manage user section from admin panel, and home page too. XSS triggers and attacker can able to steal the cookie according to the crafted payload. Steps to reproduce: 1. Create new account and verified it. 2. Navigate to Edit Profile: -> http://localhost/savsoftquiz/index.php/user/edit_user/123 3. Put the below Payload in Skype ID field. and submit it. Payload: abcd<script>alert("XSS")</script> 4. You will get XSS popup.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top