Skip to content

CrownZTX/storedXSS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 

Repository files navigation

Stored XSS in Geeklog v2.2.2

Geeklog v2.2.2 is vulnerable to Stored Cross-Site Scripting (XSS) in public_html/admin/router.php

Vendor:https://github.com/Geeklog-Core/geeklog

PoC

  1. Log in to the Geeklog's admin account and Navigate to URL Routing and click an Edit button.

Geeklog_route

  1. Enter the payloads to the input areas of Rule and Route. Then click on SAVE. The payloads are
<script>alert('xss_rule');</script>
<script>alert('xss_route');</script>

edit_routing 3. We can observe the payloads getting triggered. Multiple visits to the routing manager page will still trigger payloads.

xss_rule

xss_route

About

Geeklog v2.2.2 is vulnerable to Stored Cross-Site Scripting (XSS) in public_html/admin/router.php

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published