Share
## https://sploitus.com/exploit?id=PACKETSTORM:182272
# Exploit Title: SofaWiki 3.9.2 - Stored XSS (Authenticated)  
# Date: 10/17/2024  
# Exploit Author: Chokri Hammedi  
# Vendor Homepage: https://www.sofawiki.com  
# Software Link: https://www.sofawiki.com/site/files/snapshot.zip  
# Version: 3.9.2  
# Tested on: Windows XP  
  
  
Summary:  
  
A stored XSS exists in SofaWiki's Open Ticket feature. An authenticated  
user can inject a JavaScript payload into the ticket's title field, which  
triggers whenever the ticket is viewed.  
  
  
Proof of Concept (PoC):  
  
1. Login and go to New Ticket:  
  
http://localhost/sofawiki/index.php?name=special:tickets&ticketaction=new  
  
2. Use this payload in the Title field:  
<script>alert('XSS');</script>  
  
3. Click Open Ticket the alert will be triggered.  
The payload runs each time the ticket is opened.