This exploit demonstrates a cross-site scripting (XSS) vulnerability in RabbitWiki by injecting a malicious script via the 'title' parameter. The PoC uses a simple alert dialog to confirm the vulnerability.
Classification
Working Poc 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target:RabbitWiki (version not specified)
No auth needed
Prerequisites:Access to the vulnerable RabbitWiki instance