A persistent cross site scripting vulnerability in playlistmanger.cgi in the ASUSTOR SoundsGood application allows attackers to store cross site scripting payloads via the 'playlist' POST parameter.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.purehacking.com/blog/matthew-fulton/back-to-the-future-asustor-web-exploitation | issue tracking exploit third party advisory |
https://github.com/mefulton/asustorexploit | third party advisory exploit |
http://seclists.org/fulldisclosure/2018/May/2 | mailing list exploit third party advisory |