Exploit/Advisories
Published on November 1st, 2022 📆 | 5035 Views ⚑
0Ecommerce CodeIgniter Bootstrap 1.0 Cross Site Scripting – Torchsec
## Title: Ecommerce-CodeIgniter-Bootstrap-1.0 Cross-site scripting (reflected) RCE
## Author: nu11secur1ty
## Date: 10.29.2022
## Vendor: https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap
## Software: https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/archive/refs/heads/master.zip
## Reference: https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap
## Author: nu11secur1ty
## Date: 10.29.2022
## Vendor: https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap
## Software: https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/archive/refs/heads/master.zip
## Reference: https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap
## Description:
The value of the search_in_title request parameter is copied into the
value of an HTML tag attribute which is encapsulated in double
quotation marks.
The payload f5iun">h4s83 was submitted in the
search_in_title parameter.
The malicious user can use this vulnerability to exploit every user of
this system to make them a bot machine and etc.
[+] Exploit:
# Proof and Exploit:
[href](https://streamable.com/y3q67i)
Gloss