Security
Headlines
HeadlinesLatestCVEs

Headline

Rocket LMS 1.7 Cross Site Scripting

Rocket LMS version 1.7 suffers from a persistent cross site scripting vulnerability.

Packet Storm
#sql#xss#vulnerability#web#auth
┌┌───────────────────────────────────────────────────────────────────────────────────────┐││                                     C r a C k E r                                    ┌┘┌┘                 T H E   C R A C K   O F   E T E R N A L   M I G H T                  ││└───────────────────────────────────────────────────────────────────────────────────────┘┘ ┌────              From The Ashes and Dust Rises An Unimaginable crack....          ────┐┌┌───────────────────────────────────────────────────────────────────────────────────────┐┌┘                                  [ Vulnerability ]                                   ┌┘└───────────────────────────────────────────────────────────────────────────────────────┘┘:  Author   : CraCkEr                                                                    :│  Website  : https://codecanyon.net/user/rocketsoft                                     ││  Vendor   : RocketSoft                                                                 ││  Software : Rocket LMS 1.7                                                             ││  Vuln Type: Stored XSS                                                                 ││  Impact   : Manipulate the content of the site                                         ││                                                                                        ││────────────────────────────────────────────────────────────────────────────────────────││                                                                                       ┌┘└───────────────────────────────────────────────────────────────────────────────────────┘┘:                                                                                        :│  Release Notes:                                                                        ││  ═════════════                                                                         ││  Allow Attacker to inject malicious code into website, give ability to steal sensitive ││  information, manipulate data, and launch additional attacks.                          ││                                                                                        │┌┌───────────────────────────────────────────────────────────────────────────────────────┐┌┘                                                                                      ┌┘└───────────────────────────────────────────────────────────────────────────────────────┘┘   Greets:    The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09           CryptoJob (Twitter) twitter.com/0x0CryptoJob     ┌┌───────────────────────────────────────────────────────────────────────────────────────┐┌┘                                    © CraCkEr 2023                                    ┌┘└───────────────────────────────────────────────────────────────────────────────────────┘┘## Stored XSS------------------------------------------------------------POST /contact/store HTTP/1.1_token=iytfhBpLDYy2flCFdMGcnYGIyvONBDgK60DdwAtn&name=[XSS Payload]&[email protected]&phone=96171951951&subject=[XSS Payload]&message=[XSS Payload]&captcha=32499------------------------------------------------------------POST parameter 'name' is vulnerable to XSSPOST parameter 'subject' is vulnerable to XSSPOST parameter 'message' is vulnerable to XSS## Steps to Reproduce:1. Login (as Student) "Normal User"2. Click On [Contact US] on this Path (https://website/contact)3. Inject your [XSS Payload] in "Your name"4. Inject your [XSS Payload] in "Subject"5. Inject your [XSS Payload] in "Message Box"6. Click on [Send Message]5. When ADMIN Visit the [Notifications] - [History] in administration Panel to Check new messages on this Path (https://website/admin/notifications) & Click on [Show]6. XSS will Fire & Executed on his Browser[-] Done

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution