cPanel Filename Based Stored XSS up to v80
▸▸▸ Exploit & Vulnerability >> webaps exploit & php vulnerability
[+] Title: cPanel Filename Based Stored XSS up to v80 [+] Vendor Homepage: cpanel.com [+] Version: Up to v80. [~] Description: Attacker can run JavaScript codes on this page: https://ip_or_domain:2083/cpsessXXXXXXXXXX/frontend/THEME/raw/index.html [~] How to Reproduce: Create a file as named with your javascript payload eg: <img src onerror=alert(2)> in /home/user/logs directory and then run that link Note: You cant create a file as named with slash character by this exploit. This vulnerability is disclosed by cPanel Team's confirmation. // for secure days...
CPanel Filename Based Stored XSS up to v80 Vulnerability / Exploit Source : CPanel Filename Based Stored XSS up to v80