Home > CVE > CVE-2018-20644-PHP Scripts Mall Basic B2B Script 2.0.9 has Cross-Site Request Forgery Vulnerability

CVE-2018-20644-PHP Scripts Mall Basic B2B Script 2.0.9 has Cross-Site Request Forgery Vulnerability

CVE-2018-20644-vikas-chaudhary

***********************************************
# Exploit Title: PHP Scripts Mall Basic B2B Script 2.0.9 has Cross-Site Request Forgery (CSRF) via the Edit profile feature.
# Date: 30.12.2018
# Site Title : B2B Script
# Vendor Homepage: https://www.phpscriptsmall.com/
#Vendor Software : https://www.phpscriptsmall.com/product/professional-b2b-script/
# Software Link: http://readymadeb2bscript.com/basic-b2b/
# Category: Web Application
# Version: 2.0.9
# Exploit Author: Vikas Chaudhary
# Contact: https://www.facebook.com/profile.php?id=100011287630308
# Web: https://gkaim.com/
# Tested on: Windows 10 -Firefox
# CVE-2018-20644.
************************************************

## VENDOR SUMMARY :- PHP Scripts Mall Pvt. Ltd. is a professional software selling portal offering wide range of innovative. PHP Scripts Mall is a leading business and technology firm with 12 years of successful track record in completion and implementation of numerous projects in various
verticals and domains.. It has 300 plus PHP scripts ready to buy.

## Vulnerability Description=> Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request. With a little help of social engineering (such as sending a link via email or chat), an attacker may trick the users of a web application into executing actions of the attacker’s choosing. If the victim is a normal user, a successful CSRF attack can force the user to perform state changing requests like transferring funds, changing their email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application.
**************************************************
————————-
Proof of Concept:-
————————–
1. Go to the site (https://www.phpscriptsmall.com/product/professional-b2b-script/ ) ,Select User Demo.
2- Click on Join Free => Fill the Form and Create an Account using your name email and soo on …
3- Goto your mail and Verify it.
4-Come back to site and Login using your Verified Mail and Password.
6- Now Edit your Profile and Capture The data from Burpsuit.
7-Generate CSRF Poc from Burp and send it to Victim.

8- Send it to Victim , It’s Profile will be changed according to you
**************************************************

Admin
Welcome Sir, .. Myself Vikas Chaudhary , i was interested in general knowledge since childhood , so i thought why not to share my knowledge with you, that's why i created this educational blog. Here you find world wide general knowledge of all Latest technology , Science & History Que , and Mysterious fact of the world. Here you also find knowledge about cyber security. Thanks for visit.. keep supporting....keep Loving
https://www.gkaim.com

Leave a Reply

%d bloggers like this: