My self Vikas chaudhary .I’m Cyber Security Analyst ,I found that specified PHP Scripts Mall Website seller script 2.0.5 has stored XSS Vulnerability. To exploit this vulnerability, the following steps were taken.
VENDOR SUMMARY :-< PHP Scripts Mall Pvt. Ltd. is a professional software selling portal offering wide range of innovative PHP scripts PHP Scripts Mall is a leading business and technology firm with 12 years of successful track record in completion and implementation of numerous projects in various verticals and domains.. It has 300 plus PHP scripts ready to buy.
DESCRIPTION :-< XSS, is a way of bypassing the SOP concept. Whenever HTML code is generated dynamically, and the user input is not sanitized and is reflected on the page an attacker could insert his own HTML code. The web browser will still show the user’s code since it pertains to the website where it is injected. Stored XSS Vulnerability is found in Specified Vendor .By storing a payload there, an admin or guest user can be attacked by an attacker without tricking them to visit a malicious web site or clicking on any malicious link.
1- Go to the Vendor Product Link => https://www.phpscriptsmall.com/product/website-seller-script/ or Click Here
2- Click on REGISTER and fill all the form and then Click on Register Now ( Choose User Type =>Buyer )
3- Now fill the Captcha and click on submit
4- Goto your mail and Verify it.
5- Now come back to site and Sign in using your Verified mail and Password.
6- When you loged in , go to My Profile => My Account=> Edit Profile and past these code in given parameter
In Personal Address => “>< *img src=x onerror=prompt(/VIKAS/)>
In Company Name => “>< *img src=x onerror=prompt(/MYAIM/)>
and save it .
NOTE=>- Remove * from the code
7- You will having popup of /VIKAS/ /MYAIM/ when you refresh the page ..