header-logo
Suggest Exploit
vendor:
OpenCart
by:
Hemant Patidar (HemantSolo)
4.8
CVSS
MEDIUM
Stored Cross Site Scripting
79
CWE
Product Name: OpenCart
Affected Version From: 3.0.3.6
Affected Version To: 3.0.3.6
Patch Exists: Yes
Related CWE: CVE-2020-29471
CPE: a:opencart:opencart:3.0.3.6
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10/Kali Linux
2020

OpenCart 3.0.3.6 – ‘Profile Image’ Stored Cross Site Scripting (Authenticated)

OpenCart 3.0.3.6 is vulnerable to stored cross-site scripting (XSS) in the 'Profile Image' parameter. An authenticated attacker can upload a malicious image containing XSS payloads to the profile page, which will be triggered when the profile page is accessed by an administrator.

Mitigation:

The vendor has released a patch to address this vulnerability. It is recommended to upgrade to the latest version of OpenCart.
Source

Exploit-DB raw data:

# Exploit Title: OpenCart 3.0.3.6 - 'Profile Image' Stored Cross Site Scripting (Authenticated)
# Date: 24-11-2020
# Exploit Author: Hemant Patidar (HemantSolo)
# Vendor Homepage: https://www.opencart.com/
# Software Link: https://www.opencart.com/index.php?route=cms/download
# Version: 3.0.3.6
# Tested on: Windows 10/Kali Linux
# CVE: CVE-2020-29471

Vulnerable Parameters: Profile Image.

Steps-To-Reproduce:
1. Go to the opencart admin page.

2. Now go to the profile page.

* Before the next step write this in notepad ""><svg onload=alert("XSS")>" and save it as an payload.png

3. Now edit the image and uplaod the image as payload.png.

4. The XSS will be triggered.