Stored XSS Vulnerability in PHP Scripts Mall Entrepreneur Job Portal Script 2.0.9-[CVE-2018-7469]

[+] Credits: Neeraj Kumar
[+] Email:


Entrepreneur Job Portal Script 2.0.9

Link to access the Product:

Vulnerability Type:
Cross site scripting - Stored XSS

CVE Reference:

Vulnerability Details:
PHP Scripts Mall Entrepreneur Job Portal Script 2.0.9 Application is vulnerable to stored XSS within the "Industry Type" function in 'Manage Site'. Within the Industry Type section the application does not sanitize user supplied input and renders injected javascript code to the users browsers. Also with this injection, it affects the user page. An attackers use this vulnerability to inject malicious javascript code such as hijack user sessions, malicious redirect, deface web sites, insert hostile content, redirect users, hijack the user’s browser using malware, etc.

XSS Exploit code(s):

Affected Component:
Field Name: Edit Category Name
Parameter Name: p_name

1. Login into the admin site.
2. Goto “Categories - Industry Type".
3. Put <script>alert("document.cookie")</script> in Edit Category Name field. and save it.
4. Access the below pages:
Admin login- (Use below link to inject the XSS payload)
5. You will get the "cookie value" pop up by accessing the below links.
     a.Admin login-
     b.Normal User Login-

Figure (a): Stored XSS on Admin Portal

Figure (b): Stored XSS on User Portal

Disclosure Timeline:
Mitre Notification: February 25, 2018
Public Disclosure: February 28, 2018

Attack Type:

Impact Code execution:

Impact Information Disclosure:

Request Method(s): [+] POST
Vulnerable Product: [+] PHP Scripts Mall Entrepreneur Job Portal Script 2.0.9
Vulnerable Parameter(s): [+] p_name


[+] Disclaimer:
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. All content (c).


  1. Thanks for sharing with us your wisdom.This will absolutely going to help me in my projects .

    PHP Training in Chennai

    PHP Training

  2. Thanks For Your valuable posting, it was very informative


  3. This is a very amazing post for cheap web hosting services. in this post, you have provided all the basic information regarding.

    white label website builder

  4. Comfortabl y, the post is really the freshest on that deserving topic. I harmonise with your conclusions and definitely will thirstily look forward to your next updates.

    website builder for reseller

  5. Thank you for the link building list.I am going jot down this because it will help me a lot.Great blog! Please keep on posting such blog.

    private label website builder


Post a Comment

Popular posts from this blog

Cross-Site Request Forgery- Smartvista SVFE-2 Module [CVE-2018-15206]

Session Fixation- Smart Vista SVFE-2 Module [CVE-2018-15208]

Stored XSS Vulnerability in Hot Scripts Clone:Script Classified Version 3.1-[CVE-2018-7650]