POC详情: 64dc05cff0baa64ec54c0d68af0f44428025c161

来源
关联漏洞
标题: Red Hat oVirt Engine 跨站脚本漏洞 (CVE-2016-3113)
描述:Red Hat oVirt Engine是美国红帽(Red Hat)公司的一套开源的虚拟化管理平台,是RHEV(企业虚拟化平台)的开源版本,由ovirt-node客户端和overt-engine管理端组成。 Red Hat oVirt Engine中存在跨站脚本漏洞。攻击者可利用该漏洞注入任意Web脚本或HTML。
描述
A proof of concept to exploit the reflected XSS vulnerability in the oVirt web interface (RedHat). In this PoC a VM in the oVirt IaaS environment is to be started via the victim's browser session. JS code has been kept simple due to the rush.
介绍
# CVE-2016-3113 (PoC)

A proof of concept to exploit the reflected XSS vulnerability in the oVirt web interface (RedHat). In this PoC a VM in the oVirt IaaS environment is to be started via the victim's browser session. JS code has been kept simple due to the rush.
  
More Info here:  
https://www.itskritis.de/_uploads/jk17/Students___Freigabeversion/DURMAZ___Praesentation.pdf (slides in german language)  
https://access.redhat.com/security/cve/cve-2016-3113  
https://bugzilla.redhat.com/show_bug.cgi?format=multiple&id=1326598  
文件快照

[4.0K] /data/pocs/64dc05cff0baa64ec54c0d68af0f44428025c161 ├── [ 16K] BigInteger.min.js ├── [8.2K] ovirtXSSExploitVmStarten.js ├── [ 535] README.md └── [ 627] runExploitSelfsubmittingForm.html 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。