
12 changes to exploits/shellcodes ChaosPro 2.0 - SEH Buffer Overflow ChaosPro 2.1 - SEH Buffer Overflow ChaosPro 3.1 - SEH Buffer Overflow Kaseya VSA agent 9.5 - Privilege Escalation Cisco Email Security Appliance (IronPort) C160 - 'Host' Header Injection IntelBras TELEFONE IP TIP200/200 LITE 60.61.75.15 - Arbitrary File Read Opencart 3.x - Cross-Site Scripting Wordpress Plugin Event Tickets 4.10.7.1 - CSV Injection Alkacon OpenCMS 10.5.x - Cross-Site Scripting Alkacon OpenCMS 10.5.x - Cross-Site Scripting (2) Alkacon OpenCMS 10.5.x - Local File inclusion Craft CMS 2.7.9/3.2.5 - Information Disclosure
24 lines
No EOL
1,016 B
Text
24 lines
No EOL
1,016 B
Text
# Exploit Title: Opencart 3.x.x Authenticated Stored XSS
|
|
# Date: 08/15/2019
|
|
# Exploit Author: Nipun Somani
|
|
# Author Web: http://thehackerstore.net
|
|
# Vendor Homepage: https://www.opencart.com/
|
|
# Software Link: https://github.com/opencart/opencart
|
|
# Version: 3.x.x
|
|
# Tested on: Debian 9, Windows 10 x64
|
|
# CVE : CVE-2019-15081
|
|
|
|
|
|
Description:
|
|
The Opencart Version 3.x.x allows editing Source/HTML of the Categories /
|
|
Product / Information pages in the admin panel which isn't sanitized to
|
|
user input allowing for an attacker to execute arbitrary javascript code
|
|
leading to Stored Cross-Site-Scripting(XSS).
|
|
|
|
Proof-of-Concept(POC):
|
|
|
|
1. Log-in to admin-panel.
|
|
2. Navigate to Catlog and then select any of [Categories or Products or Information] options and and pick any entry or create one.
|
|
3. Under description click on Source option and insert your XSS payload.
|
|
i.e: "><script>alert("XSS")</script>
|
|
4. Now visit the modified page of your public website. And your injected XSS payload will execute. |