CVE-2018-20627-PHP Scripts Mall Consumer Reviews Script 4.0.3 has HTML injection via the search box.

**************************************************
# Exploit Title: PHP Scripts Mall Consumer Reviews Script 4.0.3 has HTML injection via the search box.
# Date: 30.12.2018
# Site Title : Consumer Reviews Script
# Vendor Homepage: https://www.phpscriptsmall.com/
# Software Link: http://198.38.86.159/~review/
# Category: Web Application
# Version: 4.0.3
# Exploit Author: Vikas Chaudhary
# Contact: https://www.facebook.com/profile.php?id=100011287630308
# Web: https://gkaim.com/
# Tested on: Windows 10 -Firefox
# CVE-2018-20627

*****************************************************
##Vulnerability Description=> HTML injection is an attack that is similar to Cross-site Scripting (XSS). While in the XSS vulnerability the attacker can inject and execute Javascript code, the HTML injection attack only allows the injection of certain HTML tags. When an application does not properly handle user supplied data, an attacker can supply valid HTML code, typically via a parameter value, and inject their own content into the page. This attack is typically used in conjunction with some form of social engineering, as the attack is exploiting a code-based vulnerability and a user’s trust.

———————————
## VENDOR SUMMARY :- PHP Scripts Mall Pvt. Ltd. is a professional software selling portal offering wide range of innovative. PHP Scripts Mall is a leading business and technology firm with 12 years of successful track record in completion and implementation of numerous projects in various
verticals and domains.. It has 300 plus PHP scripts ready to buy.
********************************************************
Proof of Concept:-
————————–
1. Go to the site ( http://198.38.86.159/~review/ ) .
2- Click on Register => and then fill the forms.
3-Goto your mail and Verify it.
4-Come back to site and Login using your Verified Mail and Password.
5-Now go to serach bar and paste this code



6- You will see a Fake login page
*******************************************************

Comment Please