Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-31300 PoC — Haraj v3.7 跨站脚本漏洞

Source
Associated Vulnerability
Title:Haraj v3.7 跨站脚本漏洞 (CVE-2022-31300)
Description:Haraj是沙特阿拉伯Haraj公司的一个买卖平台。 Haraj v3.7 版本存在安全漏洞,该漏洞源于 DM 部分组件中存在跨站点脚本问题。攻击者利用该漏洞可通过精心设计的 POST 请求执行任意 Web 脚本或 HTML。
Description
Haraj Script 3.7 - DM Section Authenticated Stored XSS
Readme
# CVE-2022-31300
Haraj Script 3.7 - DM Section Authenticated Stored XSS

#### Exploit Title: Haraj Script 3.7 - Authenticated Stored XSS
#### Date: 2022-06-13
#### CVE: CVE-2022-31300
#### Exploit Author: Abdulaziz Saad (@b4zb0z)
#### Vendor Homepage: https://angtech.org/
#### Software Link: https://angtech.org/product/view/3
#### Version: 3.7
#### Tested on: LAMP, Ubuntu

---

[#] Exploitation :
	exploit DM messages section with js payload by manipluating and repeating sent request via Burpsuite or DevTools
File Snapshot

[4.0K] /data/pocs/b15e217d6ee7d3a9d78da978cf72bc33be1b33e2 └── [ 514] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.