A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 and 9.4.0, which are publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611 - Patch, Third Party Advisory | |
References | () https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS - Exploit, Third Party Advisory | |
References | () https://github.com/vulf/Peel-Shopping-cart-9.4.0-Stored-XSS - Exploit, Third Party Advisory | |
References | () https://www.peel-shopping.com/modules/telechargement/telecharger.php?id=7 - Product, Vendor Advisory | |
References | () https://www.secuneus.com/cve-2021-27190-peel-shopping-ecommerce-shopping-cart-stored-cross-site-scripting-vulnerability-in-address/ - Exploit, Third Party Advisory |
Information
Published : 2021-02-12 03:15
Updated : 2024-11-21 05:57
NVD link : CVE-2021-27190
Mitre link : CVE-2021-27190
CVE.ORG link : CVE-2021-27190
JSON object : View
Products Affected
peel
- peel_shopping
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')