header-logo
Suggest Exploit
vendor:
Social Microblogging PRO
by:
Halil Dalabasmaz
8,8
CVSS
HIGH
Stored XSS
79
CWE
Product Name: Social Microblogging PRO
Affected Version From: 1.5
Affected Version To: 1.5
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Chrome & Iceweasel
2014

Social Microblogging PRO 1.5 Stored XSS Vulnerability

The 'Web Site' input field at the Profile section of Social Microblogging PRO 1.5 is not secure and can be used to run XSS payloads. Sample payload: http://example.com/">[xssPayload]

Mitigation:

Filter the input field against XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title: Social Microblogging PRO 1.5 Stored XSS Vulnerability
# Date: 29-12-2014
# Exploit Author: Halil Dalabasmaz
# Version: v1.5
# Vendor Homepage:
http://codecanyon.net/item/social-microblogging-pro/9217005
# Tested on: Chrome & Iceweasel

# Vulnerability Description:

===Stored XSS===
"Web Site" input is not secure at Profile section. You can run XSS payloads
on "Web Site" input.

Sample Payload for Stored XSS: http://example.com/">[xssPayload]

=Solution=
Filter the input field against to XSS attacks.
================