Skip to content
Permalink
main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time

PRESTA-SHOP 1.7.7.4 REFLECTED CROSS SITE SCRIPTING (CVE-2023-31508)

Vulnerable Parameter: message

XSS Payload : %3cimg+src+onerror%3dprompt%288%29%3e

<Vendor> : https://www.prestashop.com/

Vulnerable Code Part

Default File Path

/modules/contactform/contactform.php

Note: Some parameters have been changed by the company using the application.

Description

The PrestaShop web application lead the message value without any sanitization on contact-form .The attacker could be inject xss payload with changes the HTTP 'post' request to Http 'get' request for exploitation. That Exploitation shown belows.

Http Request-Response