Stored XSS Vulnerability in Hot Scripts Clone:Script Classified Version 3.1-[CVE-2018-7650]

[+] Credits: Neeraj Kumar
[+] Email: neeraj.iiita2009@gmail.com

Vendor:
====================
https://www.phpscriptsmall.com/

Product:
===================
Hot Scripts Clone:Script Classified Version 3.1

Link to access the Product:
=====================
https://www.phpscriptsmall.com/product/hot-scripts-clone-script-classified/

Vulnerability Type:
==========================
Cross site scripting - Stored XSS

CVE Reference:
==============
CVE-2018-7650

Vulnerability Details:
======================
Hot Scripts Clone:Script Classified Version 3.1 Application is vulnerable to stored XSS with the "Add New" function in Management User. Within the "Add New" section the application does not sanitize user supplied input and renders injected javascript code to the users browsers. This is different from CVE-2018-6878. An attackers use this vulnerability to inject malicious javascript code such as hijack user sessions, malicious redirect, deface web sites, insert hostile content, redirect users, hijack the user’s browser using malware, etc.

XSS Exploit code(s):
====================
"><h1><IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>123</h1>

Affected Component:
====================
Field Name: "Add New"
Parameter Name: "name"

Proof-of-Concept:
====================
1. Login into the admin site.
2. Goto “Management-->User-->Add New".
3. Put Payload:
"><h1><IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>123</h1>
in "Name" field and fill other required details then save it.
4. Access this saved page by: http://<url>/~scrictory/admin/register.php.
5. You will get the "cookie value" pop up when the mouse pointer is moved onto an username element.
Figure: Stored XSS

Disclosure Timeline:
=====================
Mitre Notification: March 02, 2018
Public Disclosure: March 06, 2018

Attack Type:
=======================
Remote

Impact Code execution:
=======================
True

Impact Information Disclosure:
=======================
True

Description:
=====================================================
Request Method(s): [+] POST
Vulnerable Product: [+] Hot Scripts Clone:Script Classified Version 3.1
Vulnerable Parameter(s): [+] "name"

References:
=====================================================
https://www.owasp.org/index.php/Top_10-2017_A7-Cross-Site_Scripting_(XSS)

[+] Disclaimer:
=====================================================
The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. All content (c).

Comments

  1. The opponents employ this Devops As a Service weakness for you to put in malevolent javascript rule including hijack individual times, malevolent direct, deface websites, put in dangerous written content, direct consumers, hijack your user’s visitor employing viruses, and many others.

    ReplyDelete
  2. THANKS FOR SHARING SUCH A AMAZING WORK
    GREAT PIECE OF WORK!!!
    access point supplier in dubai

    ReplyDelete
  3. Thank you! This post is very interesting. Amazon devops

    ReplyDelete
  4. That's quite interesting. Also, check DevOps services.

    ReplyDelete
  5. Thanks for Sharing this amazing Post. Many organizations have already moved their workloads to the cloud. What do you think about cloud computing??

    ReplyDelete
  6. Thanks for sharing information! Company Zefirity - https://zefirity.com/en/ - also uses similiar things during their work.

    ReplyDelete
  7. This information is important for developers, but for senior SEOs it aways be needed for SEO services

    ReplyDelete
  8. Very useful piece of information for those who are interested in IT. I would suggest everyone to do check out DevOps which becoming popular with time.
    www.clustox.com/devops/

    ReplyDelete
  9. Nice Post!
    Want to collaborate with the top mobile app development company in India? Feel free to contact us.

    ReplyDelete

Post a Comment

Popular posts from this blog

Polaris’ Intellect Core Banking Software Version 9.7.1- Open Redirect [CVE-2018-14931]

Stored XSS Vulnerability in Bookme Control Panel 2.0-[CVE-2018-8737]