关联漏洞
描述
A proof of concept to exploit the reflected XSS vulnerability in the oVirt web interface (RedHat). In this PoC a VM in the oVirt IaaS environment is to be started via the victim's browser session. JS code has been kept simple due to the rush.
介绍
# CVE-2016-3113 (PoC)
A proof of concept to exploit the reflected XSS vulnerability in the oVirt web interface (RedHat). In this PoC a VM in the oVirt IaaS environment is to be started via the victim's browser session. JS code has been kept simple due to the rush.
More Info here:
https://www.itskritis.de/_uploads/jk17/Students___Freigabeversion/DURMAZ___Praesentation.pdf (slides in german language)
https://access.redhat.com/security/cve/cve-2016-3113
https://bugzilla.redhat.com/show_bug.cgi?format=multiple&id=1326598
文件快照
[4.0K] /data/pocs/64dc05cff0baa64ec54c0d68af0f44428025c161
├── [ 16K] BigInteger.min.js
├── [8.2K] ovirtXSSExploitVmStarten.js
├── [ 535] README.md
└── [ 627] runExploitSelfsubmittingForm.html
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。