Advertisement




Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023030025

Below is a copy:

Helmet Store Showroom Site - XXE Injection
# Title: Helmet Store Showroom Site - XXE Injection
# Author: @Eawhitehat - Eren Arslan
# Demo available : https://www.sourcecodester.com/php/15851/helmet-store-showroom-site-php-and-mysql-free-source-code.html
# CVE: N/A
# XSS
# Screenshot :
https://prnt.sc/7Nh7gOjdnsyR
https://prnt.sc/LmOQKkZ6geJV
https://prnt.sc/ZgMTMWG3U4A1

Used Payload :
<?xml version="1.0"?><methodCall><methodName>demo.sayHello</methodName><params></params></methodCall>

Demo Account:
Username: admin
Password: admin123

Method :
Connect to panel : http://localhost/admin

#Vulnerablity

1. After login, go to ../admin/?page=categories (Category List)
2. Add New Category and paste the payload in category name and description (for the fun)
3. Reload the Category List page and welcome your XXE Injection

Copyright ©2023 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.