Montiorr 1.7.6m Cross Site Scripting

CVE Category Price Severity
CVE-2020-1670 CWE-79 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2021-04-27
CVSS:4.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L 0.02606 0.68163

CVSS vector description

Our sensors found this exploit at:

Below is a copy:

Montiorr 1.7.6m Cross Site Scripting
# Exploit Title: Montiorr 1.7.6m - File Upload to XSS
# Date: 25/4/2021
# Exploit Author: Ahmad Shakla
# Software Link:
# Tested on: Kali GNU/Linux 2020.2
# Detailed Bug Description :

An attacker can preform an XSS attack via image upload

Steps :

1)Create a payload with the following format :
><img src=x onerror=alert("XSS")>.png

2) Install the database by going to the following link :

3)Register for a new account on the server by going to the following link :

4)Login with your credentials on the following link :

5)Go to the following link and upload the payload :

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum