Advertisement






AmazCart Laravel Ecommerce System CMS 3.4 Cross Site Scripting

CVE Category Price Severity
CVE-2021-3765 CWE-79 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2023-01-24
CPE
cpe:cpe:/a:amazcart:amazcart-laravel-ecommerce-system-cms:3.4
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N 0.18093 0.58304

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023010045

Below is a copy:

AmazCart Laravel Ecommerce System CMS 3.4 Cross Site Scripting
# Exploit Title: AmazCart - Laravel Ecommerce System CMS 3.4 - 'Search' Cross-Site-Scripting  Reflected (AJAX)
# Date: 17/01/2023
# Exploit Author: Sajibe Kanti
# CVE ID:
# Vendor Name: CodeThemes
# Vendor Homepage: https://spondonit.com/
# Software Link: https://codecanyon.net/item/amazcart-laravel-ecommerce-system-cms/34962179
# Version: 3.4
# Tested on: Live Demo
# Demo Link : https://amazy.rishfa.com/

# Description #

AmazCart - Laravel Ecommerce System CMS 3.4 is vulnerable to Reflected
cross-site scripting because of insufficient user-supplied data
sanitization. Anyone can submit a Reflected XSS payload without login in
when searching for a new product on the search bar. This makes the
application reflect our payload in the frontend search ber, and it is fired
everything the search history is viewed.

# Proof of Concept (PoC) : Exploit #

1) Goto: https://amazy.rishfa.com/
2) Enter the following payload in 'Search Iteam box' : "><script>alert(1)</script>
3) Now You Get a Popout as Alert 1
4) Reflected XSS payload is fired

# Image PoC : Reference Image #

1) Payload Fired: https://prnt.sc/QQaiZB3tFMVB

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.