Share
## https://sploitus.com/exploit?id=PACKETSTORM:162946
# Exploit Title: 4Images 1.8 - 'redirect' Reflected XSS  
# Exploit Author: Piyush Patil  
# Vendor Homepage: https://www.4homepages.de/  
# Software Link: https://www.4homepages.de/?download=4images1.8.zip&code=81da0c7b5208e172ea83d879634f51d6  
# Version: 4Images Gallery 1.8  
# Tested on: Windows 10 and Kali  
# CVE : CVE-2021-27308  
  
-Description:  
A cross-site scripting (XSS) vulnerability in the admin login panel in 4images version 1.8 allows remote attackers to inject JavaScript via the "redirect" parameter.  
  
  
-Steps to reproduce:  
1- Goto 4images admin panel page (demo instance: https://localhost/4images/admin/index.php)  
2- Enter the credentials , Turn on the intercept and click on "Login"  
3- copy paste the XSS payload after redirect=./../admin/index.php%3Fsessionid=xxxxxPASTEPAYLOADHERE  
4-Forward the request and you can see XSS is triggered.