Ecommerce-PHP-kurniaramadhan-1.0- Stored Cross Site Scripting

2025.01.12
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-79

**************************************************************************************** #Exploit Title: Ecommerce-PHP-kurniaramadhan-1.0- Stored Cross Site Scripting #Title of the Vulnerability: Stored Cross Site Scripting #Product Name: E-Commerce-PHP #Vendor: https://github.com/kurniaramadhan/ #Vulnerable Product Link: https://github.com/kurniaramadhan/E-Commerce-PHP #Date: 2025-01-10 #Exploit Author: Maloy Roy Orko #Google Dork: "Powered by kurniaramadhan" #Category:Webapps #Tested On: Android,Mac, Firefox ## Reference: https://www.websecurityinsights.my.id/2024/12/ecommerce-php-by-kurniaramadhan-sql.html https://vuldb.com/?id.290798 ###Affected Components: /admin/create_product.php & /admin/product.php #Description: Stored Cross Site Scripting in "/admin/create_product.php & /admin/product.php" in "E-commerce PHP application By kurniaramadhan v 1.0" allows "remote" attacker "to store XSS payload as create product fields aren't protected" via "/admin/create_product.php & /admin/product.php". ###Proof of Concept: ### Demo : http://192.168.1.100:8080/admin/create_product.php http://192.168.1.100:8080/admin/product.php ###Attack Vectors: To exploit vulnerability,he has to input exploits via prodyct name change or create in new name and then he can execute malicious javascript code in the visitors browser,mainly,here XSS can be exploited then. ###Detailed Blog About The Poc: https://www.websecurityinsights.my.id/2024/12/ecommerce-php-by-kurniaramadhan-sql.html ********************************************************* #Discovered by: Maloy Roy Orko #Website: https://www.websecurityinsights.my.id/ ****************************************************************************************

References:

https://vuldb.com/?id.290798
https://www.websecurityinsights.my.id/2024/12/ecommerce-php-by-kurniaramadhan-sql.html?m=1
https://nvd.nist.gov/vuln/detail/CVE-2024-13205
https://www.cve.org/CVERecord?id=CVE-2024-13205


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2025, cxsecurity.com

 

Back to Top