जमा करें #71511: Online Food Ordering System V2 - Persistent XSSजानकारी

शीर्षकOnline Food Ordering System V2 - Persistent XSS
विवरण# Exploit Title: Online Food Ordering System V2 - Persistent XSS # Exploit Author: Krutika Thakur # Vendor Name: oretnom23 # Vendor Homepage: https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html # Software Link: https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html # Version: v2.0 # Tested on: Windows 11, Apache Description: A Persistent XSS issue in Online Food Ordering System V2 allows to inject Arbitrary JavaScript in "Category" Parameter. Parameter: Category Form = Category Payload: "><script>prompt(1)</script> Steps: 1) Login as a Admin user 2) Now in that we can see an tab named "Category List" in that go to "Category" 3) The Parameter "Reason" in this we put our payload. Payload: "><script>prompt(1)</script>
उपयोगकर्ता lucifoxer001 (UID 33693)
सबमिशन12/01/2023 08:26 PM (3 साल पहले)
संयम12/01/2023 10:20 PM (2 hours later)
स्थितिस्वीकृत
VulDB प्रविष्टि218186 [SourceCodester Online Food Ordering System 2.0 Category List व्याख्या क्रॉस साइट स्क्रिप्टिंग]
अंक17

Interested in the pricing of exploits?

See the underground prices here!