| 제목 | Online Food Ordering System V2 - Persistent XSS |
|---|
| 설명 | # Exploit Title: Online Food Ordering System V2 - Persistent XSS
# Exploit Author: Krutika Thakur
# Vendor Name: oretnom23
# Vendor Homepage: https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html
# Software Link: https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html
# Version: v2.0
# Tested on: Windows 11, Apache
Description:
A Persistent XSS issue in Online Food Ordering System V2 allows to inject Arbitrary JavaScript in "Category" Parameter.
Parameter:
Category Form = Category
Payload:
"><script>prompt(1)</script>
Steps:
1) Login as a Admin user
2) Now in that we can see an tab named "Category List" in that go to "Category"
3) The Parameter "Reason" in this we put our payload.
Payload: "><script>prompt(1)</script> |
|---|
| 사용자 | lucifoxer001 (UID 33693) |
|---|
| 제출 | 2023. 01. 12. PM 08:26 (3 연령 ago) |
|---|
| 모더레이션 | 2023. 01. 12. PM 10:20 (2 hours later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 218186 [SourceCodester Online Food Ordering System 2.0 Category List 이유 크로스 사이트 스크립팅] |
|---|
| 포인트들 | 17 |
|---|