domainmod 4.11.01 displayname crosssite scripting
▸▸▸ Exploit & Vulnerability >> webapps exploit & php vulnerability
# Exploit Title: DomainMOD 4.11.01 - Cross-Site Scripting # Date: 2018-11-22 # Exploit Author: Mohammed Abdul Raheem # Vendor Homepage: domainmod (https://domainmod.org/) # Software Link: domainmod (https://github.com/domainmod/domainmod) # Version: v4.09.03 to v4.11.01 # CVE : CVE-2018-19892 # A Stored Cross-site scripting (XSS) was discovered in DomainMod application # versions from v4.09.03 to v4.11.01 # (https://github.com/domainmod/domainmod/issues/85) # After logging into the Domainmod application panel, browse to the # /admin/dw/add-server.php page and inject a javascript XSS payload in # DisplayName, Username & host name fields "><img src=x onerror=alert("Xss-By-Abdul-Raheem")>
Domainmod 4.11.01 displayname crosssite scripting Vulnerability / Exploit Source : Domainmod 4.11.01 displayname crosssite scripting