# Exploit Title: ChainCity Real Estate Investment Platform 1.0 - Stored XSS # Exploit Author: skalvin aka (CraCkEr) # Date: 12/07/2023 # Vendor: Bug Finder # Vendor Homepage: https://bugfinder.net/ # Software Link: https://script.bugfinder.net/chaincity/ # Tested on: Windows 10 Pro # Impact: Manipulate the content of the site ## Description Allow Attacker to inject malicious code into website, give ability to steal sensitive information, manipulate data, and launch additional attacks. Path: /chaincity/user/ticket/create POST parameter 'subject' is vulnerable to XSS --------------------------------------------------------- POST /chaincity/user/ticket/create HTTP/2 Content-Disposition: form-data; name="subject" --------------------------------------------------------- Content-Disposition: form-data; name="message" Any MSG --------------------------------------------------------- ## Steps to Reproduce: 1. Login as (Client) 2. Go to [Support Ticket] on this Path: https://website/chaincity/user/ticket 3. Click on [Create New Ticket] on this Path: https://website/chaincity/user/ticket/create 4. Inject your XSS Payload in [Subject] 5. Enter Any Message in [Message Box] 6. Click on [CREATE] 7. When ADMIN visit [SUPPORT TICKETS] on this Path : https://website/chaincity/admin/tickets 8. XSS Will Fire and Executed on his Browser [-] Done