ଜମା କରନ୍ତୁ #48133: Human Resource Management System v1.0 - Normal user Apply leave "Reason" Parameter = Persistent XSSସୂଚନା

ଶୀର୍ଷକHuman Resource Management System v1.0 - Normal user Apply leave "Reason" Parameter = Persistent XSS
ବର୍ଣ୍ଣନା# Exploit Title: Human Resource Management System v1.0 - Normal user Apply leave "Reason" Parameter = Persistent XSS # Exploit Author: Pratik Shetty # Vendor Name: oretnom23 # Vendor Homepage: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html # Software Link: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html # Version: v1.0 # Tested on: Windows 10, Apache Description: A Persistent XSS issue in Human Resource Management System v1.0 allows to inject Arbitrary JavaScript in "Reason" Parameter. Parameter: Leave Apply = Reason Payload: <script>prompt(1)</script> Steps: 1) Login as a normal user 2) Now in that we can see an tab named "Leave" in that go to "Apply" 3) The Parameter "Reason" in this we put our payload. Payload: <script>prompt(1)</script> 4) Now fill the other details and save the file 5) Go to "Application" and we can see that our Payload has been executed.
ଉତ୍ସ⚠️ https://github.com/draco1725/POC/blob/main/Exploit/Stored%20Xss
ଉପଭୋକ୍ତା
 draco (UID 24011)
ଦାଖଲ10/13/2022 07:35 PM (3 ବର୍ଷ ବର୍ଷ ago)
ମଧ୍ୟମ ଧରଣର10/14/2022 09:02 AM (13 hours later)
ସ୍ଥିତିଗ୍ରହଣ କରାଯାଇଛି
VulDB ଏଣ୍ଟ୍ରି210831 [Human Resource Management System 1.0 Leave ବ୍ୟାଖ୍ୟା କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ]
ପଏଣ୍ଟ20

Do you know our Splunk app?

Download it now for free!