Home Product Show Room Site 1.0
Post
Cancel

Product Show Room Site 1.0

There are several persistent cross-site scripting vulnerabilities present in version 1.0 of the Product Show Room Site.

1
SHA-256 | a796961a488458cb4bb41f2e00c8a65730ac1bded2e03daff8ea9786a74d591e
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
    # Product Show Room Site - 'Telephone' Stored Cross-Site Scripting(XSS)
    
    
    #### Exploit Title: Product Show Room Site - 'Telephone' Stored Cross-Site Scripting(XSS)
    #### Exploit Author: webraybtl@webray.com.cn inc
    #### Vendor Homepage: https://www.sourcecodester.com/php/15370/product-show-room-site-phpoop-free-source-code.html
    #### Software Link: https://www.sourcecodester.com/download-code?nid=15370&title=Product+Show+Room+Site+in+PHP%2FOOP+Free+Source+Code
    #### Version: Product Show Room Site 1.0
    #### Tested on: Windows Server 2008 R2 Enterprise, Apache ,Mysql
    
    #### Description
    Persistent XSS (or Stored XSS) attack is one of the three major categories of XSS attacks, the others being Non-Persistent (or Reflected) XSS and DOM-based XSS. In general, XSS attacks are based on the victims trust in a legitimate, but vulnerable, website or web application.Product Show Room Site does not filter the content correctly at the "Contact info-Telephone" module, resulting in the generation of stored XSS.
    
    #### Payload used:
    `<script>alert(111)</script>`
    
    #### Proof of Concept
    
    1. Login the CMS.
    Default Admin Access
    Username: admin
    Password: admin123
    
    1. Open Page http://172.24.5.107/psrs/admin/?page=system_info/contact_info and click View button
    
    2. Put XSS payload  (`<script>alert(111)</script>`) in the Telephone box and click on Update to publish the page
       ![image](https://user-images.githubusercontent.com/60683449/171591851-2068eea2-b789-464f-8afb-9f6b6f8eaedd.png)
    
    3. Open http://172.24.5.107/psrs/?p=contact,Viewing the successfully published page,We can see the alert.
       ![image](https://user-images.githubusercontent.com/60683449/171591881-2962a429-f2de-4979-8e27-6fdd8f62c61c.png)
    
    
    
    
    -------
    
    
    # Product Show Room Site - 'Message' Stored Cross-Site Scripting(XSS)
    
    
    #### Exploit Title: Product Show Room Site - 'Message' Stored Cross-Site Scripting(XSS)
    #### Exploit Author: webraybtl@webray.com.cn inc
    #### Vendor Homepage: https://www.sourcecodester.com/php/15370/product-show-room-site-phpoop-free-source-code.html
    #### Software Link: https://www.sourcecodester.com/download-code?nid=15370&title=Product+Show+Room+Site+in+PHP%2FOOP+Free+Source+Code
    #### Version: Product Show Room Site 1.0
    #### Tested on: Windows Server 2008 R2 Enterprise, Apache ,Mysql
    
    #### Description
    Persistent XSS (or Stored XSS) attack is one of the three major categories of XSS attacks, the others being Non-Persistent (or Reflected) XSS and DOM-based XSS. In general, XSS attacks are based on the victims trust in a legitimate, but vulnerable, website or web application.Product Show Room Site does not filter the content correctly at the "Contact info-Telephone" module, resulting in the generation of stored XSS.
    
    #### Payload used:
    `<script>alert(111)</script>`
    
    #### Proof of Concept
    
    1. Login the CMS.
    Default Admin Access
    Username: admin
    Password: admin123
    
    1. Open Page http://172.24.5.107/psrs/?p=contact
    
    2. Put XSS payload  (`<script>alert(111)</script>`) in the Message box and click on Send Message to publish the page
      ![image](https://user-images.githubusercontent.com/60683449/171591580-cc3ca01c-9e37-4e05-9351-4b9d7c7749df.png)
      ![image](https://user-images.githubusercontent.com/60683449/171591599-be5e8d7f-1d95-43ad-875a-9884f7052fa6.png)
    
    
    4. Open http://172.24.5.107/psrs/admin/?page=inquiries,Viewing the Top 1 of Inquiries  page,We can see the alert.
      ![image](https://user-images.githubusercontent.com/60683449/171591660-c12ce9ac-aab1-45e9-b99f-7514dd28f698.png)


Source :   https://packetstormsecurity.com

This post is licensed under CC BY 4.0 by the author.