Healwire Online Pharmacy 3.0 – Persistent Cross-Site Scripting / Cross-Site Request Forgery
1) Create an account and go to your profile. 2) When we want to put "<script></script>" in the fields,"script" will be replaced with null. so we can bypass this filter by using javascript's events like "onmouseover" or "oninput" . Put one of these payloads into the fields : 1 - " oninput=alert('xss') " 2 - " onmouseover=alert('xss') " 3) You will get an alert box inside the page . ( after put something into the fields or move mouse on the fields) With csrf vulnerability,attacker can easily change user's authentication. So in this script , we have anti-CSRF token .We can't change user's information without token. but there is a vulnerable parameter which has reflected xss in another page of this script. http://store.webandcrafts.com/demo/healwire/?msg= [We have Reflected XSS here] Now we can bypass anti-csrf by this parameter and using javascript: