Title: Projectsend r572 - Cross Site Scripting (Reflected) Disclosed: 5/28/15 Vendor Patched: 6/6/15 Published: 6/10/15 Credit: Matt Landers - matt@mjltech.net Original Advisory: www.mjltech.net/adv/MJLTECH%20-%20Projectsend%20R572%20XSS.txt ====================================================================== Confirmed Vulnerable: Projectsend R572 Vendor: http://www.projectsend.org/ Description from vendor website: "ProjectSend is a self-hosted application (you can install it easily on your own VPS or shared web hosting account) that lets you upload files and assign them to specific clients that you create yourself! Secure, private and easy. No more depending on external services or e-mail to send those files!" ====================================================================== Vulnerable file: index.php Vulnerable parameter: login_form_user Description of vulnerability: The parameter 'login_form_user'is vulnerable to XSS via POST request. Proof of Concept: POST http://www.********.com/index.php?login_form_user=">