domainmod 4.11.01 owner name field crosssite scripting
▸▸▸ Exploit & Vulnerability >> webapps exploit & php vulnerability
# Exploit Title: DomainMOD 4.11.01 - Cross-Site Scripting # Date: 2018-11-22 # Exploit Author: Mohammed Abdul Raheem # Vendor Homepage: domainmod (https://domainmod.org/) # Software Link: domainmod (https://github.com/domainmod/domainmod) # Version: v4.09.03 to v4.11.01 # CVE : CVE-2018-19749 # A Stored Cross-site scripting (XSS) was discovered in DomainMod application # versions from v4.09.03 to v4.11.01(https://github.com/domainmod/domainmod/issues/81) After logging into the Domainmod application panel, browse to the assets/add/account-owner.php page and inject a javascript XSS payload in owner name field "><img src=x onerror=alert("Xss-By-Abdul-Raheem")> #POC : attached here https://github.com/domainmod/domainmod/issues/81
Domainmod 4.11.01 owner name field crosssite scripting Vulnerability / Exploit Source : Domainmod 4.11.01 owner name field crosssite scripting