Title | Human Resource Management System v1.0 - Stored XSS in multiple parameters |
---|
Description | # Exploit Title: Human Resource Management System - Multiple Stored XSS
# Exploit Author: Gaurav Bhatia
# Vendor Name: oretnom23
# Vendor Homepage: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html
# Software Link: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html
# Version: v1.0
# Tested on: Windows 11, Apache
Description: In Human Resource Management System v1.0 there are Multiple stored xss in Master list directory pages allows to inject Arbitrary JavaScript
Parametres:
City name
state name
country name
position name
Payload:
<script>confirm(document.domain)</script>
Steps:
1) Login into your admin account
2) Now go to master list in that we see there are various page such as "city", "state" , "country" and "position"
3) In that all the naming parameters such as "city name", "state name", "country name" and "position name" put your payload
Payload: <script>confirm(document.domain)</script>
4) Now when you save one of the page with your payload the payload has been executed |
---|
User | GauravBhatia (ID 33684) |
---|
Submission | 13/10/2022 17:42 (2 years ago) |
---|
Moderation | 13/10/2022 19:28 (2 hours later) |
---|
Status | تمت الموافقة |
---|
VulDB Entry | 210786 |
---|