You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description: Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Stored XSS is also sometimes referred to as Persistent or Type-I XSS.
Affected software: Evolution-1.4.x
Type of vulnerability: XSS (Stored)
Discovered by: BreachLock
Website: https://www.breachlock.com
Author: Balvinder Singh
Description: Stored attacks are those where the injected script is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc. The victim then retrieves the malicious script from the server when it requests the stored information. Stored XSS is also sometimes referred to as Persistent or Type-I XSS.
Proof of concept:

Step1: Login to the evolution cms.
Step2: URL: http://localhost/evolution-1.4.x/evolution-1.4.x/manager/#?a=72
Here the title parameter is vulnerable to XSS.
Step3: Here the xss got executed for page weblink title parameter.

URL: http://localhost/evolution-1.4.x/evolution-1.4.x/manager/#?a=3&id=2&r=1&dir=DESC&sort=createdon
The text was updated successfully, but these errors were encountered: