Vanguard 2.1 Cross Site Scripting ↭ – Digitalmunition




Exploit/Advisories no-image-featured-image.png

Published on April 7th, 2020 📆 | 6322 Views ⚑

0

Vanguard 2.1 Cross Site Scripting ↭

# Exploit Title: Vanguard 2.1 Multi XSS Vunlerabilities
# Google Dork:N/A
# Date: 2020-04-04
# Exploit Author: @ThelastVvV
# Vendor Homepage: https://codecanyon.net/item/vanguard-marketplace-digital-products-php/20287975
# Version: 2.1
# Tested on: 5.4.0-4parrot1-amd64

———————————————————

Summary:

Persistent Cross-site Scripting in message&product title-tags also there’s Non-Persistent Cross-site scripting in product search box.

PoC 1:

A- Message

1- create an account on vanguard marketplace
2- go to send mail
https://example/mails/new

In the “Object” field type my my preferred payload : “>

3-then choose the target (username ) then hit submit
4- now go to the mailbox and click on the msg
https://example/mails/read/1

et voila xssed!

PoC 2:

B:Product

1-go to add new product
2- In the “Product Name” field type my my preferred payload : “>
2- now view the product page
https://example/p/(id)
3 -click on download in the product page
https://example/download/(id)

et voila xssed!

PoC 3:

In Products Search box use payload:
“>

Impact:
XSS can lead to user’s Session Hijacking, and if used in conjunction with a social engineering attack it can also lead to disclosure of sensitive data, CSRF attacks and other critical attacks on all users of the product .

Screentshoots:

A -https://imgur.com/jkCfaEh
B-https://imgur.com/3GuKGJr

Source link

Tagged with:



Leave a Reply

Your email address will not be published. Required fields are marked *


loading...