Title | Purchase Order Management System - Multiple Persistent XSS |
---|
Description | # Exploit Title: Purchase Order Management System - Multiple Persistent XSS
# Exploit Author: Kshitij Rewandkar
# Vendor Name: oretnom23
# Vendor Homepage: https://www.sourcecodester.com/php/14935/purchase-order-management-system-using-php-free-source-code.html
# Software Link: https://www.sourcecodester.com/php/14935/purchase-order-management-system-using-php-free-source-code.html
# Version: v1.0
# Tested on: Windows 11, Apache
Description:
A Persistent XSS issue in Purchase Order Management System v1.0 allows to inject Arbitrary JavaScript in Multiple Supplier create Parameter.
Parameters Vulnerable:
A) Supplier Name
B) Address
C) Contact person
D) Contact
Payload:
<script>confirm(1)</script>
Steps:
1) Login into your account
2) Now go to "Supplier List" and create a new file.
3) Now put the payload in the below parameter:
A) Supplier Name
B) Address
C) Contact person
D) Contact
Payload: <script>confirm(1)</script>
4) Now save the details and our payload has been executed |
---|
Source | ⚠️ https://github.com/DisguisedRoot/Exploit/blob/main/Persistent%20XSS/PoC |
---|
User | DisguisedRoot (ID 33702) |
---|
Submission | 2022-10-13 20時37分 (2 years ago) |
---|
Moderation | 2022-10-14 09時05分 (12 hours later) |
---|
Status | 已接受 |
---|
VulDB Entry | 210832 |
---|