Headline
Active eCommerce CMS 6.5.0 Cross Site Scripting
Active eCommerce CMS version 6.5.0 suffers from a persistent cross site scripting vulnerability.
# Exploit Title: Active eCommerce CMS 6.5.0 - 'svg' Stored Cross-SiteScripting (XSS)# Date: 19/01/2023# Exploit Author: Sajibe Kanti# Vendor Name: ActiveITzone# Vendor Homepage: https://activeitzone.com/# Software Link: https://codecanyon.net/item/active-ecommerce-cms/23471405# Version: 6.5.0# Tested on: Live ( Centos & Litespeed Web Server)# Demo Link : https://demo.activeitzone.com/ecommerce/# Description #The Active eCommerce CMS 6.5.0 application has a vulnerability in theprofile picture upload feature that allows for stored cross-site scripting(XSS) attacks. Specifically, the vulnerability lies in the handling of"svg" image files, which can contain malicious code. An attacker canexploit this vulnerability by uploading a specially crafted "svg" imagefile as a profile picture, which will then be executed by the applicationwhen the user views the profile. This can allow the attacker to stealsensitive information, such as login credentials, or to perform othermalicious actions on the user's behalf. This vulnerability highlights theimportance of proper input validation and image file handling in webapplication development.# Exploit Details ## Vulnerable Path : /aiz-uploader/upload# Parameter: files (POST)# Vector: <svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg"> <rect width="300" height="100"style="fill:rgb(0,0,255);stroke-width:3;stroke:rgb(0,0,0)" /> <script type="text/javascript"> alert("haha XSS"); </script></svg># Proof of Concept (PoC) : Exploit #1) Goto: https://localhost2) Click Registration3) Login Your Account4) Go Manage Profile5) Now Upload Given Vector as anyname.svg (you must put vector code inanyname.svg file)6) After Upload Clic to view Your profile picture7) XSS Popup Will Fired# Image PoC : Reference Image #1) Payload Fired: https://prnt.sc/cW0F_BtpyMcv