| ଶୀର୍ଷକ | Human Resource Management System v1.0 - Normal user Apply leave "Reason" Parameter = Persistent XSS |
|---|
| ବର୍ଣ୍ଣନା | # Exploit Title: Human Resource Management System v1.0 - Normal user Apply leave "Reason" Parameter = Persistent XSS
# Exploit Author: Pratik Shetty
# Vendor Name: oretnom23
# Vendor Homepage: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html
# Software Link: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html
# Version: v1.0
# Tested on: Windows 10, Apache
Description:
A Persistent XSS issue in Human Resource Management System v1.0 allows to inject Arbitrary JavaScript in "Reason" Parameter.
Parameter:
Leave Apply = Reason
Payload:
<script>prompt(1)</script>
Steps:
1) Login as a normal user
2) Now in that we can see an tab named "Leave" in that go to "Apply"
3) The Parameter "Reason" in this we put our payload.
Payload: <script>prompt(1)</script>
4) Now fill the other details and save the file
5) Go to "Application" and we can see that our Payload has been executed. |
|---|
| ଉତ୍ସ | ⚠️ https://github.com/draco1725/POC/blob/main/Exploit/Stored%20Xss |
|---|
| ଉପଭୋକ୍ତା | draco (UID 24011) |
|---|
| ଦାଖଲ | 10/13/2022 07:35 PM (3 ବର୍ଷ ବର୍ଷ ago) |
|---|
| ମଧ୍ୟମ ଧରଣର | 10/14/2022 09:02 AM (13 hours later) |
|---|
| ସ୍ଥିତି | ଗ୍ରହଣ କରାଯାଇଛି |
|---|
| VulDB ଏଣ୍ଟ୍ରି | 210831 [Human Resource Management System 1.0 Leave ବ୍ୟାଖ୍ୟା କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ] |
|---|
| ପଏଣ୍ଟ | 20 |
|---|