Easy File Sharing Web Server 6.8 - Persistent Cross-Site Scripting
Author: Sick Psycko
type: webapps
platform: php
port:
date_added: 2014-12-30
date_updated: 2014-12-30
verified: 0
codes: CVE-2014-9439;OSVDB-116685
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comefssetup.exe
Exploit Title: Easy File Sharing Webserver =>6.8 Persistent XSS
Date: 12/26/14
Exploit Author: SickPsycko
Vendor Homepage: http://www.sharing-file.com/
Version:6.8
Tested on: Windows 7 32bit
The exploit is within the username field.
So to exploit this vulnerability, One must place the payload into the
specified field when registering.
http://i.imgur.com/bibu81C.png
Once logged in. User will be greeted with such.