There are several persistent cross-site scripting vulnerabilities present in version 1.0 of the Product Show Room Site.
1
SHA-256 | a796961a488458cb4bb41f2e00c8a65730ac1bded2e03daff8ea9786a74d591e
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
# Product Show Room Site - 'Telephone' Stored Cross-Site Scripting(XSS)
#### Exploit Title: Product Show Room Site - 'Telephone' Stored Cross-Site Scripting(XSS)
#### Exploit Author: webraybtl@webray.com.cn inc
#### Vendor Homepage: https://www.sourcecodester.com/php/15370/product-show-room-site-phpoop-free-source-code.html
#### Software Link: https://www.sourcecodester.com/download-code?nid=15370&title=Product+Show+Room+Site+in+PHP%2FOOP+Free+Source+Code
#### Version: Product Show Room Site 1.0
#### Tested on: Windows Server 2008 R2 Enterprise, Apache ,Mysql
#### Description
Persistent XSS (or Stored XSS) attack is one of the three major categories of XSS attacks, the others being Non-Persistent (or Reflected) XSS and DOM-based XSS. In general, XSS attacks are based on the victim’s trust in a legitimate, but vulnerable, website or web application.Product Show Room Site does not filter the content correctly at the "Contact info-Telephone" module, resulting in the generation of stored XSS.
#### Payload used:
`<script>alert(111)</script>`
#### Proof of Concept
1. Login the CMS.
Default Admin Access
Username: admin
Password: admin123
1. Open Page http://172.24.5.107/psrs/admin/?page=system_info/contact_info and click View button
2. Put XSS payload (`<script>alert(111)</script>`) in the Telephone box and click on Update to publish the page
![image](https://user-images.githubusercontent.com/60683449/171591851-2068eea2-b789-464f-8afb-9f6b6f8eaedd.png)
3. Open http://172.24.5.107/psrs/?p=contact,Viewing the successfully published page,We can see the alert.
![image](https://user-images.githubusercontent.com/60683449/171591881-2962a429-f2de-4979-8e27-6fdd8f62c61c.png)
-------
# Product Show Room Site - 'Message' Stored Cross-Site Scripting(XSS)
#### Exploit Title: Product Show Room Site - 'Message' Stored Cross-Site Scripting(XSS)
#### Exploit Author: webraybtl@webray.com.cn inc
#### Vendor Homepage: https://www.sourcecodester.com/php/15370/product-show-room-site-phpoop-free-source-code.html
#### Software Link: https://www.sourcecodester.com/download-code?nid=15370&title=Product+Show+Room+Site+in+PHP%2FOOP+Free+Source+Code
#### Version: Product Show Room Site 1.0
#### Tested on: Windows Server 2008 R2 Enterprise, Apache ,Mysql
#### Description
Persistent XSS (or Stored XSS) attack is one of the three major categories of XSS attacks, the others being Non-Persistent (or Reflected) XSS and DOM-based XSS. In general, XSS attacks are based on the victim’s trust in a legitimate, but vulnerable, website or web application.Product Show Room Site does not filter the content correctly at the "Contact info-Telephone" module, resulting in the generation of stored XSS.
#### Payload used:
`<script>alert(111)</script>`
#### Proof of Concept
1. Login the CMS.
Default Admin Access
Username: admin
Password: admin123
1. Open Page http://172.24.5.107/psrs/?p=contact
2. Put XSS payload (`<script>alert(111)</script>`) in the Message box and click on Send Message to publish the page
![image](https://user-images.githubusercontent.com/60683449/171591580-cc3ca01c-9e37-4e05-9351-4b9d7c7749df.png)
![image](https://user-images.githubusercontent.com/60683449/171591599-be5e8d7f-1d95-43ad-875a-9884f7052fa6.png)
4. Open http://172.24.5.107/psrs/admin/?page=inquiries,Viewing the Top 1 of Inquiries page,We can see the alert.
![image](https://user-images.githubusercontent.com/60683449/171591660-c12ce9ac-aab1-45e9-b99f-7514dd28f698.png)
Source : https://packetstormsecurity.com