Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-41503 PoC — Jetimob Plataforma Imobiliaria 安全漏洞

Source
Associated Vulnerability
Title:Jetimob Plataforma Imobiliaria 安全漏洞 (CVE-2024-41503)
Description:Jetimob Plataforma Imobiliaria是巴西的一个房地产平台。 Jetimob Plataforma Imobiliaria 20240627-0版本存在安全漏洞,该漏洞源于Busca功能的Ttulo字段存在跨站脚本漏洞,可能导致注入任意Web脚本或HTML。
Readme
# CVE-2024-41503

- **CVE:** CVE-2024-41503
- **Software:** Jetimob Plataforma Imobiliaria (CRM/ERP/CMS)
- **Version:** 20240627-0
- **Vulnerability:** Stored Cross-Site Scripting (XSS)
- **Description:** The "Busca" (search) function used throughout the application contains a filter option that can be saved - when saving it, there is a "Título" form field that allows injection of JavaScript code, storing the code in the application. It is then executed when the filter is created or when clicking to delete it, when the deletion confirmation window containing the payload appears.
- **Payload:** `<img src=x onerror=alert(document.cookie)>`

![](img/1.png)  

![](img/2.png)  

![](img/3.png)
File Snapshot

[4.0K] /data/pocs/94385adbf03d35cecc17c90ab9460adf736b680c ├── [4.0K] img │   ├── [125K] 1.png │   ├── [106K] 2.png │   └── [123K] 3.png └── [ 699] README.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.