| Título | https://pmweb.com/ PMWeb PMWeb Version 7.2.00 stored XSS after bypassing the Web Application Firewall |
|---|
| Descripción | We have identified a stored Cross-Site Scripting (XSS) vulnerability in this application. Initially, the Web Application Firewall (WAF) in place prevented us from executing JavaScript code. To demonstrate this, we will start with a basic XSS payload that the WAF blocks.
Subsequently, we will present our custom advanced payload that successfully bypassed the WAF and resulted in a stored XSS in all input fields of the application. Let's proceed with the demonstration. |
|---|
| Fuente | ⚠️ https://mega.nz/file/nEcUTJxI#L2DCw4f4iwbXuErXlB1NRowprk1UZjWw6FtLgBgBpEA |
|---|
| Usuario | ahmed8199 (UID 60803) |
|---|
| Sumisión | 2024-07-28 21:18 (hace 2 años) |
|---|
| Moderación | 2024-08-04 10:20 (7 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 273559 [PMWeb 7.2.00 Web Application Firewall secuencias de comandos en sitios cruzados] |
|---|
| Puntos | 20 |
|---|