Lucene search

K
packetstormMohammed Abdul RaheemPACKETSTORM:151695
HistoryFeb 15, 2019 - 12:00 a.m.

DomainMOD 4.11.01 Cross Site Scripting

2019-02-1500:00:00
Mohammed Abdul Raheem
packetstormsecurity.com
21

0.001 Low

EPSS

Percentile

47.5%

`# Exploit Title: DomainMOD 4.11.01 - Cross-Site Scripting  
# Date: 2018-11-22  
# Exploit Author: Mohammed Abdul Raheem  
# Vendor Homepage: domainmod (https://domainmod.org/)  
# Software Link: domainmod (https://github.com/DomainMod/DomainMod)  
# Version: v4.09.03 to v4.11.01  
# CVE : CVE-2018-20009  
  
# A Stored Cross-site scripting (XSS) was discovered in DomainMod application  
# versions from v4.09.03 to v4.11.01  
# After logging into the Domainmod application panel, browse to the  
/assets/add/ssl-provider.php page and inject a javascript XSS payload  
in ssl-provider-name, ssl-provider's-url "><img src=x  
onerror=alert("Xss-By-Abdul-Raheem")>  
  
#POC : attached here https://github.com/domainmod/domainmod/issues/88  
  
# Exploit Title: DomainMOD 4.11.01 - Cross-Site Scripting  
# Date: 2018-11-22  
# Exploit Author: Mohammed Abdul Raheem  
# Vendor Homepage: domainmod (https://domainmod.org/)  
# Software Link: domainmod (https://github.com/DomainMod/DomainMod)  
# Version: v4.09.03 to v4.11.01  
# CVE : CVE-2018-20011  
  
# A Stored Cross-site scripting (XSS) was discovered in DomainMod application  
# versions from v4.09.03 to v4.11.01  
# After logging into the Domainmod application panel, browse to the  
/assets/add/category.php page and inject a javascript XSS payload in  
CatagoryName, StakeHolder fields "><img src=x  
onerror=alert("Xss-By-Abdul-Raheem")>  
  
#POC : attached here https://github.com/domainmod/domainmod/issues/88  
  
# Exploit Title: DomainMOD 4.11.01 - Cross-Site Scripting  
# Date: 2018-11-22  
# Exploit Author: Mohammed Abdul Raheem  
# Vendor Homepage: domainmod (https://domainmod.org/)  
# Software Link: domainmod (https://github.com/DomainMod/DomainMod)  
# Version: v4.09.03 to v4.11.01  
# CVE : CVE-2018-19914  
# A Stored Cross-site scripting (XSS) was discovered in DomainMod application  
# versions from v4.09.03 to v4.11.01  
# After logging into the Domainmod application panel, browse to the  
/assets/add/dns.php page and inject a javascript XSS payload in  
Profile Name & notes fields "><img src=x onerror=alert("XSSed-By-Abdul-Kareem")>  
  
#POC : attached here https://github.com/domainmod/domainmod/issues/87  
  
# Exploit Title: DomainMOD 4.11.01 - Cross-Site Scripting  
# Date: 2018-11-22  
# Exploit Author: Mohammed Abdul Kareem  
# Vendor Homepage: domainmod (https://domainmod.org/)  
# Software Link: domainmod (https://github.com/DomainMod/DomainMod)  
# Version: v4.09.03 to v4.11.01  
# CVE : CVE-2018-19915  
# A Stored Cross-site scripting (XSS) was discovered in DomainMod application  
# versions from v4.09.03 to v4.11.01  
# After logging into the Domainmod application panel, browse to the  
/assets/edit/host.php?whid=5 page and inject a javascript XSS payload  
in "Web Host Name" & "Web Host's url fields "><img src=x  
onerror=alert("XSSed-By-Abdul-Kareem")>  
  
#POC : attached here https://github.com/domainmod/domainmod/issues/87  
  
`

0.001 Low

EPSS

Percentile

47.5%