You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A xss vulnerability was discovered in doorGets v7.0.
There is a stored XSS vulnerability in ARTICLE if I use the payload </textarea><script>alert(111)</script>.
Then add payload(</textarea><script>alert(111)</script>) to article content.
Save the article and click the generated link.
Change the content of an article.
When you click the article content, it will trigger the payload.
View page source, you will find the XSS payload.
The text was updated successfully, but these errors were encountered:
SunJ3t
changed the title
doorGets v7.0 has a Stored Cross Site Scripting in ARTICLE.
doorGets v7.0 has a Stored Cross Site Scripting in ARTICLE CONTENT.
Feb 19, 2020
A xss vulnerability was discovered in doorGets v7.0.
There is a stored XSS vulnerability in ARTICLE if I use the payload </textarea><script>alert(111)</script>.
First, you need to add article.
http://192.168.187.130/doorgets/dg-user/cn/?controller=moduleblog&uri=blog&action=add
Then add payload(</textarea><script>alert(111)</script>) to article content.
Save the article and click the generated link.
Change the content of an article.
When you click the article content, it will trigger the payload.
View page source, you will find the XSS payload.
The text was updated successfully, but these errors were encountered: