Submit #48127: Human Resource Management System v1.0 - Stored XSS in multiple parametersالمعلومات

TitleHuman Resource Management System v1.0 - Stored XSS in multiple parameters
Description# Exploit Title: Human Resource Management System - Multiple Stored XSS # Exploit Author: Gaurav Bhatia # Vendor Name: oretnom23 # Vendor Homepage: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html # Software Link: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html # Version: v1.0 # Tested on: Windows 11, Apache Description: In Human Resource Management System v1.0 there are Multiple stored xss in Master list directory pages allows to inject Arbitrary JavaScript Parametres: City name state name country name position name Payload: <script>confirm(document.domain)</script> Steps: 1) Login into your admin account 2) Now go to master list in that we see there are various page such as "city", "state" , "country" and "position" 3) In that all the naming parameters such as "city name", "state name", "country name" and "position name" put your payload Payload: <script>confirm(document.domain)</script> 4) Now when you save one of the page with your payload the payload has been executed
UserGauravBhatia (ID 33684)
Submission13/10/2022 17:42 (2 years ago)
Moderation13/10/2022 19:28 (2 hours later)
Statusتمت الموافقة
VulDB Entry210786

Want to stay up to date on a daily basis?

Enable the mail alert feature now!