Exploits / Vulnerability Discovered : 2021-01-25 |
Type : webapps |
Platform : php
This exploit / vulnerability Collabtive 3.1 address persistent crosssite scripting is for educational purposes only and if it is used you will do on your own risk!
1- Login to your account.
2- Go to the profile edit page and write your XSS/HTML payload into "Address" section.
- You will see the executed HTML payload at there. (HTML Injection)
- You will see the executed XSS payload at profile edit section. (XSS)
==> Executed Payloads <==
XSS Payload ==> " onfocus="alert(1)" autofocus="
HTML Payload ==> <h1>DehaBerkinBir</h1>
Fatal error: Uncaught mysqli_sql_exception: Too many connections in /var/www/html/_dbconfig.inc.php:45
Stack trace:
#0 /var/www/html/_dbconfig.inc.php(45): mysqli->__construct()
#1 /var/www/html/_footer.inc.php(2): require('...')
#2 /var/www/html/security/exploits-vulnerability/vuln.php(221): require('...')
#3 {main}
thrown in /var/www/html/_dbconfig.inc.php on line 45