跳转到帖子

游客您好,欢迎来到黑客世界论坛!您可以在这里进行注册。

赤队小组-代号1949(原CHT攻防小组)在这个瞬息万变的网络时代,我们保持初心,创造最好的社区来共同交流网络技术。您可以在论坛获取黑客攻防技巧与知识,您也可以加入我们的Telegram交流群 共同实时探讨交流。论坛禁止各种广告,请注册用户查看我们的使用与隐私策略,谢谢您的配合。小组成员可以获取论坛隐藏内容!

TheHackerWorld官方

OpenFiler 2.99.1 - Multiple Persistent Cross-Site Scripting Vulnerabilities

精选回复

发布于
# Exploit Title: Multiple persistent XSS in Openfiler

# Exploit author: Dolev Farhi @f1nhack

# Date 07/05/2014

# Vendor homepage: http://www.openfiler.com

# Affected Software version: 2.99.1

# Alerted vendor: 7.5.14


Software Description
=====================
Openfiler is a network storage operating system. With the features we built into Openfiler, you can take advantage of file-based Network Attached Storage and block-based 
Storage Area Networking functionality in a single cohesive framework.



Vulnerability Description
=========================
Multiple Persistent Cross Site Scripting 



Steps to reproduce / PoC:
=========================
1.1. Login to Openfiler dashboard.

1.2. Under system tab -> Network Access Configuration create a new NAC

1.3. Name the NAC <script>alert(document.cookie);</script>

1.4. Navigate to another tab.

1.5. Navigate back to System tab

1.6. the XSS reflects to the window.



2.1. Create a new Volume Group.

2.2. Create a new Logical Volume with any name you want.

2.3. in the Description, enter </script>alert("XSS")</script>

2.4. Click OK.

2.5. Navigate to "Shares" tab -> XSS

2.6. Navigate to "Snapshot Shares" -> XSS

2.7. Navigate to "Existing shares" -> XSS

2.8. Navigate to "Quota" -> XSS





  <-> PoC Video: https://www.youtube.com/watch?v=CLG5iS3qU-M&feature=youtu.be
            

创建帐户或登录后发表意见

最近浏览 0

  • 没有会员查看此页面。