OpenCart 3.0.3.6 – ‘Profile Image’ Stored Cross-Site Scripting (Authenticated)

  • 作者: Hemant Patidar
    日期: 2020-11-24
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/49098/
  • # Exploit Title: OpenCart 3.0.3.6 - 'Profile Image' Stored Cross Site Scripting (Authenticated)
    # Date: 24-11-2020
    # Exploit Author: Hemant Patidar (HemantSolo)
    # Vendor Homepage: https://www.opencart.com/
    # Software Link: https://www.opencart.com/index.php?route=cms/download
    # Version: 3.0.3.6
    # Tested on: Windows 10/Kali Linux
    # CVE: CVE-2020-29471
    
    Vulnerable Parameters: Profile Image.
    
    Steps-To-Reproduce:
    1. Go to the opencart admin page.
    
    2. Now go to the profile page.
    
    * Before the next step write this in notepad ""><svg onload=alert("XSS")>" and save it as an payload.png
    
    3. Now edit the image and uplaod the image as payload.png.
    
    4. The XSS will be triggered.