{"id":59832,"date":"2024-10-17T09:02:47","date_gmt":"2024-10-17T06:02:47","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/182278\/sofawiki392r-xss.txt"},"modified":"2024-10-17T09:02:47","modified_gmt":"2024-10-17T06:02:47","slug":"sofawiki-3-9-2-cross-site-scripting","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/sofawiki-3-9-2-cross-site-scripting\/","title":{"rendered":"SofaWiki 3.9.2 Cross Site Scripting"},"content":{"rendered":"<p># Exploit Title: SofaWiki 3.9.2 &#8211; Reflected XSS (Authenticated) via Regex<br \/>Replace Preview<br \/># Date: 10\/17\/2024<br \/># Exploit Author: Chokri Hammedi<br \/># Vendor Homepage: https:\/\/www.sofawiki.com<br \/># Software Link: https:\/\/www.sofawiki.com\/site\/files\/snapshot.zip<br \/># Version: 3.9.2<br \/># Tested on: Windows XP<\/p>\n<p>*Summary:*<\/p>\n<p>A *reflected XSS* vulnerability exists in the *Regex Replace Preview*<br \/>feature of SofaWiki. When a malicious payload is injected into the *Replace*<br \/>field, the payload is executed immediately in the user\u2019s browser during the<br \/>preview.<br \/>Proof of Concept (PoC):<\/p>\n<p>1. Login to SofaWiki.<br \/>2. Go to Special =&gt; Regex :<br \/>http:\/\/localhost\/sofawiki\/index.php?action=view&amp;name=special:regex&amp;lang=en<\/p>\n<p>3. In the Regex field, enter any text (e.g., test).<br \/>4. In the Replace field, inject the following payload:<\/p>\n<p>&lt;script&gt;alert(&#8216;XSS&#8217;);&lt;\/script&gt;<\/p>\n<p>5. Click Replace Preview to trigger the XSS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p># Exploit Title: SofaWiki 3.9.2 &#8211; Reflected XSS (Authenticated) via RegexReplace Preview# Date: 10\/17\/2024# Exploit Author: Chokri Hammedi# Vendor Homepage: https:\/\/www.sofawiki.com# Software Link: https:\/\/www.sofawiki.com\/site\/files\/snapshot.zip# Version: 3.9.2# Tested on: Windows XP *Summary:* A *reflected XSS* vulnerability exists in the *Regex Replace Preview*feature of SofaWiki. When a malicious payload is injected into the *Replace*field, the payload is &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-59832","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/59832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=59832"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/59832\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=59832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=59832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=59832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}