Posts Stored XSS - Issabel PBX
Post
Cancel

Stored XSS - Issabel PBX

How to exploitation XSS Stored on Issabel PBX

Software

Home Page: https://www.issabel.org/

Source Forge: https://sourceforge.net/projects/issabelpbx/

Release: 2021/01/09

Exploitation

In Isabel’s administrative interface, there is a report panel. On the billing panel, we can create new rates. The form of creating new rates is vulnerable to stored XSS.

URL: https://localhost/index.php?menu=billing_rates

Alert

The name and prefix fields are vulnerable, if we inject an XSS payload into either of them we will succeed.

Alert

Inserting a javascript script, we get the result.

1
<script>alert('https://github.com/0xdutra')</script>

Alert

Stored XSS successfully performed.

Alert

Session hijack example

https://youtu.be/apJH_D68lZI

This post is licensed under CC BY 4.0 by the author.
Recent Update
Trending Tags
Contents

Trending Tags