Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-3113 PoC — Red Hat oVirt Engine 跨站脚本漏洞

Source
Associated Vulnerability
Title:Red Hat oVirt Engine 跨站脚本漏洞 (CVE-2016-3113)
Description:Red Hat oVirt Engine是美国红帽(Red Hat)公司的一套开源的虚拟化管理平台,是RHEV(企业虚拟化平台)的开源版本,由ovirt-node客户端和overt-engine管理端组成。 Red Hat oVirt Engine中存在跨站脚本漏洞。攻击者可利用该漏洞注入任意Web脚本或HTML。
Description
A proof of concept to exploit the reflected XSS vulnerability in the oVirt web interface (RedHat). In this PoC a VM in the oVirt IaaS environment is to be started via the victim's browser session. JS code has been kept simple due to the rush.
Readme
# CVE-2016-3113 (PoC)

A proof of concept to exploit the reflected XSS vulnerability in the oVirt web interface (RedHat). In this PoC a VM in the oVirt IaaS environment is to be started via the victim's browser session. JS code has been kept simple due to the rush.
  
More Info here:  
https://www.itskritis.de/_uploads/jk17/Students___Freigabeversion/DURMAZ___Praesentation.pdf (slides in german language)  
https://access.redhat.com/security/cve/cve-2016-3113  
https://bugzilla.redhat.com/show_bug.cgi?format=multiple&id=1326598  
File Snapshot

[4.0K] /data/pocs/64dc05cff0baa64ec54c0d68af0f44428025c161 ├── [ 16K] BigInteger.min.js ├── [8.2K] ovirtXSSExploitVmStarten.js ├── [ 535] README.md └── [ 627] runExploitSelfsubmittingForm.html 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.