You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Stored XSS vulnerability in Version 4.11.01 which allows remote attacker to inject arbitrary script or html. This being stored, will impact all users who have permissions to view the vulnerable page.
Steps:
Goto vulnerable endpoint /assets/add/dns.php
At the place of Profile Name & notes put xss payload "><img src=x onerror=alert("Xssed-By-Abdul-Kareem")>
Steps:
Goto vulnerable endpoint /assets/edit/host.php?whid=5
At the place of "Web Host Name" & "Web Host's url" put xss payload "><img src=x onerror=alert("Xssed-By-Abdul-Kareem")>
The text was updated successfully, but these errors were encountered:
Stored XSS vulnerability in Version 4.11.01 which allows remote attacker to inject arbitrary script or html. This being stored, will impact all users who have permissions to view the vulnerable page.
Vulnerable Endpoint: https://demo.domainmod.org/assets/add/dns.php
Steps:
Goto vulnerable endpoint /assets/add/dns.php
At the place of Profile Name & notes put xss payload "><img src=x onerror=alert("Xssed-By-Abdul-Kareem")>
Vulnerable Endpoint: https://demo.domainmod.org/assets/edit/host.php?whid=5
Steps:
Goto vulnerable endpoint /assets/edit/host.php?whid=5
At the place of "Web Host Name" & "Web Host's url" put xss payload "><img src=x onerror=alert("Xssed-By-Abdul-Kareem")>
The text was updated successfully, but these errors were encountered: