# Exploit Title: gp easy CMS Minishop 1.5 plugin persistent XSS # Date: july 2 2012 # Exploit Author: Carlos Mario Penahos Hollmann # Vendor Homepage:http://gpeasy.com/Download # Software Link: http://gpeasy.com/Special_Addon_Plugins?cmd=download&id=31 # Version: 1.5 The vulnerable code is in the Minishop 1.5 plugin on the Admin_Minishop.php , after installing it give to any user right to edit the minishop, then this user can inject arbitrary javascript code when using add product or add category(both options can trigger the XSS) in the name field typing As you can see data is not sanitize :) function AddCategory() { require('Language.php'); echo '' . $Mtxt['Add Category'] .'
'; $ca = & $_REQUEST['cat']; $cat = $this->my_replace($ca, "no"); $catdes = & $_REQUEST['catdesc']; $catdesc= $this->my_replace($catdes, "yes"); $Category = $this->GetCategories(); if (empty($cat) ) { echo '
'; echo ''; echo '
' ; echo ''; echo ''; echo '
'; echo '
CategoryDescription

'; echo ''; } else { $Category[$cat] = $catdesc;//echo 'Debug:' . var_dump($Category) .':'; $this->SaveCategories($Category); } }