Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-31298 PoC — Haraj 跨站脚本漏洞

Source
Associated Vulnerability
Title:Haraj 跨站脚本漏洞 (CVE-2022-31298)
Description:Haraj是沙特阿拉伯Haraj公司的一个买卖平台。 Haraj v3.7 版本存在安全漏洞,该漏洞源于广告评论部分中存在跨站点脚本问题。攻击者利用该漏洞可通过精心设计的 POST 请求执行任意 Web 脚本或 HTML。
Description
Haraj Script 3.7 - Authenticated Stored XSS
Readme
# CVE-2022-31298
Haraj Script 3.7 - Authenticated Stored XSS

#### Exploit Title: Haraj Script 3.7 - Authenticated Stored XSS
#### Date: 2022-06-13
#### CVE: CVE-2022-31298
#### Exploit Author: Abdulaziz Saad (@b4zb0z)
#### Vendor Homepage: https://angtech.org/
#### Software Link: https://angtech.org/product/view/3
#### Version: 3.7
#### Tested on: LAMP, Ubuntu

---

[#] Exploitation :
	exploit ads comment section directly with js payload
File Snapshot

[4.0K] /data/pocs/64033658105465dee34ca42d12e4139204c7a6ec └── [ 443] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.