exploitdb
WORKING POC
VERIFIED
by Moudi · textwebappsphp
https://www.exploit-db.com/exploits/34732
This exploit demonstrates a cross-site scripting (XSS) vulnerability in DragDropCart by injecting arbitrary JavaScript code via the 'search' parameter. The payload bypasses basic sanitization using mixed case and URL encoding.
Classification
Working Poc 90%
Target:
DragDropCart (version unspecified)
No auth needed
Prerequisites:
Access to a vulnerable DragDropCart instance
exploitdb
WORKING POC
VERIFIED
by Moudi · textwebappsphp
https://www.exploit-db.com/exploits/34734
This exploit demonstrates a cross-site scripting (XSS) vulnerability in DragDropCart by injecting arbitrary JavaScript code via the 'redirect' parameter in the login.php URL. The payload bypasses basic sanitization using encoded characters and line breaks.
Classification
Working Poc 90%
Target:
DragDropCart (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable login.php endpoint
exploitdb
WORKING POC
VERIFIED
by Moudi · textwebappsphp
https://www.exploit-db.com/exploits/34731
This exploit demonstrates a cross-site scripting (XSS) vulnerability in DragDropCart by injecting arbitrary JavaScript code via the 'prefix' parameter in the 'getstate.php' endpoint. The payload uses obfuscation techniques to bypass basic filters.
Classification
Working Poc 90%
Target:
DragDropCart (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable endpoint · User interaction to trigger the payload
exploitdb
WORKING POC
VERIFIED
by Moudi · textwebappsphp
https://www.exploit-db.com/exploits/34735
This exploit demonstrates a cross-site scripting (XSS) vulnerability in DragDropCart by injecting a malicious script via the 'product' parameter in the URL. The payload bypasses basic sanitization using mixed case and URL encoding.
Classification
Working Poc 90%
Target:
DragDropCart (version unspecified)
No auth needed
Prerequisites:
Access to a vulnerable DragDropCart instance
exploitdb
WORKING POC
VERIFIED
by Moudi · textwebappsphp
https://www.exploit-db.com/exploits/34730
This exploit demonstrates a cross-site scripting (XSS) vulnerability in DragDropCart by injecting a script tag into the 'sid' parameter of the 'ddcart.php' file. The vulnerability arises due to insufficient sanitization of user-supplied data.
Classification
Working Poc 90%
Target:
DragDropCart (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable DragDropCart application
exploitdb
WRITEUP
VERIFIED
by Moudi · textwebappsphp
https://www.exploit-db.com/exploits/34733
The provided text describes a cross-site scripting (XSS) vulnerability in DragDropCart, where user-supplied input is not properly sanitized. The example demonstrates a simple XSS payload injected via the 'search' parameter in a URL.
Classification
Writeup 90%
Target:
DragDropCart (version not specified)
No auth needed
Prerequisites:
Access to a vulnerable DragDropCart instance