Advertisement






Tasked PHP Task Management Multiple Stored XSS Injection

CVE Category Price Severity
N/A CWE-79 $400 High
Author Risk Exploitation Type Date
Unknown High Remote 2019-04-16
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019040138

Below is a copy:

Tasked PHP Task Management Multiple Stored XSS Injection
PoC: Go to the demo website http://byluminary.com/envato_demos/Tasked/login.php and register your new account with payload inside First Name and/or Last Name fields (keep in mind that mail activation is enabled, to use any temp mail service for tests). Activate your account and log in using your credentials, then go to http://byluminary.com/envato_demos/Tasked/index.php?page=profile to launch your payload(s).

More vulnerable fields:
http://byluminary.com/envato_demos/Tasked/index.php?page=categories - create new category with desired payload inside Name and/or Description field(s);
http://byluminary.com/envato_demos/Tasked/index.php?page=openTasks and http://byluminary.com/envato_demos/Tasked/index.php?page=calendar - same stuff like categories.

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum