Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-3113 PoC — Red Hat oVirt Engine 跨站脚本漏洞

Source
Associated Vulnerability
Title:Red Hat oVirt Engine 跨站脚本漏洞 (CVE-2016-3113)
Description:Cross-site scripting (XSS) vulnerability in ovirt-engine allows remote attackers to inject arbitrary web script or HTML.
Description
A proof of concept to exploit the reflected XSS vulnerability in the oVirt web interface (RedHat). In this PoC a VM in the oVirt IaaS environment is to be started via the victim's browser session. JS code has been kept simple due to the rush.
Readme
# CVE-2016-3113 (PoC)

A proof of concept to exploit the reflected XSS vulnerability in the oVirt web interface (RedHat). In this PoC a VM in the oVirt IaaS environment is to be started via the victim's browser session. JS code has been kept simple due to the rush.
  
More Info here:  
https://www.itskritis.de/_uploads/jk17/Students___Freigabeversion/DURMAZ___Praesentation.pdf (slides in german language)  
https://access.redhat.com/security/cve/cve-2016-3113  
https://bugzilla.redhat.com/show_bug.cgi?format=multiple&id=1326598  
File Snapshot

[4.0K] /data/pocs/64dc05cff0baa64ec54c0d68af0f44428025c161 ├── [ 16K] BigInteger.min.js ├── [8.2K] ovirtXSSExploitVmStarten.js ├── [ 535] README.md └── [ 627] runExploitSelfsubmittingForm.html 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →