Skip to content

Instantly share code, notes, and snippets.

View enferas's full-sized avatar

Feras Al-Kassar enferas

  • Jean Monnet University
  • Saint-Etienne, France
View GitHub Profile
@enferas
enferas / CVE-2018-20962.md
Created December 12, 2022 10:51
Old report CVE-2018-20962
@enferas
enferas / CVE-2019-15489.md
Created December 12, 2022 10:55
old report CVE-2019-15489

Link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15489

<input type="text" name="q" class="form-control" placeholder="Search..." value="{!! request()->input('q') !!}">

The sanitization

<input type="text" name="q" class="form-control" placeholder="Search..." value="{{ request()->input('q') }}">
@enferas
enferas / CVE-2021-27371.md
Created December 12, 2022 11:18
old reported CVE-2021-27371
@enferas
enferas / CVE-2022-41938.md
Last active January 13, 2023 22:20
Old Report CVE-2022-41938
@enferas
enferas / XSS_in_mapos.md
Created December 25, 2022 22:28
XSS_in_mapos

Link: https://github.com/RamonSilva20/mapos

Multiple XSS vulnerabilities.

For example,

'telefone' is saved in the DB, then it is retrieved and printed in the view.

In file mapos-master\application\controllers\Clientes.php

@enferas
enferas / CVE-2023-23017.md
Last active January 21, 2023 12:06
XSS_cron-manager

CVE-2023-23017 is assigned

Link: https://github.com/MUlt1mate/cron-manager

XSS vulnerability with date_begin and date_end.

In file cron-manager-master\examples\codeigniter\application\controllers\TasksController.php

public function tasksReport()
@enferas
enferas / CVE-2023-23018.md
Last active January 21, 2023 12:07
XSS_Sales-Management
@enferas
enferas / CVE-2023-23016.md
Last active January 21, 2023 12:05
XSS_Wscats-cms

CVE-2023-23016 is assigned

Link: https://github.com/Wscats/cms

Many XSS vulnerabilities.

For example,

The injection through the news title. The source will be inserted in the DB, then it will be passed from the DB to the view.

@enferas
enferas / CVE-2023-23015.md
Last active January 21, 2023 12:03
XSS Kalkun

CVE-2023-23015 is assigned

Link: https://github.com/kalkun-sms/Kalkun

XSS vulnerability with the user name.

We see that the username will be setted in the DB without sanitization in file Kalkun-devel\application\models\User_model.php

$this-&gt;db-&gt;set('username', trim($this-&gt;input-&gt;post('username')));
@enferas
enferas / CVE-2023-23014.md
Last active January 21, 2023 12:01
XSS in InventorySystem