| ଶୀର୍ଷକ | Purchase Order Management System - Multiple Persistent XSS |
|---|
| ବର୍ଣ୍ଣନା | # Exploit Title: Purchase Order Management System - Multiple Persistent XSS
# Exploit Author: Kshitij Rewandkar
# Vendor Name: oretnom23
# Vendor Homepage: https://www.sourcecodester.com/php/14935/purchase-order-management-system-using-php-free-source-code.html
# Software Link: https://www.sourcecodester.com/php/14935/purchase-order-management-system-using-php-free-source-code.html
# Version: v1.0
# Tested on: Windows 11, Apache
Description:
A Persistent XSS issue in Purchase Order Management System v1.0 allows to inject Arbitrary JavaScript in Multiple Supplier create Parameter.
Parameters Vulnerable:
A) Supplier Name
B) Address
C) Contact person
D) Contact
Payload:
<script>confirm(1)</script>
Steps:
1) Login into your account
2) Now go to "Supplier List" and create a new file.
3) Now put the payload in the below parameter:
A) Supplier Name
B) Address
C) Contact person
D) Contact
Payload: <script>confirm(1)</script>
4) Now save the details and our payload has been executed |
|---|
| ଉତ୍ସ | ⚠️ https://github.com/DisguisedRoot/Exploit/blob/main/Persistent%20XSS/PoC |
|---|
| ଉପଭୋକ୍ତା | DisguisedRoot (UID 33702) |
|---|
| ଦାଖଲ | 10/13/2022 08:37 PM (3 ବର୍ଷ ବର୍ଷ ago) |
|---|
| ମଧ୍ୟମ ଧରଣର | 10/14/2022 09:05 AM (12 hours later) |
|---|
| ସ୍ଥିତି | ଗ୍ରହଣ କରାଯାଇଛି |
|---|
| VulDB ଏଣ୍ଟ୍ରି | 210832 [SourceCodester Purchase Order Management System 1.0 Supplier Supplier Name/Address/Contact person/Contact କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ] |
|---|
| ପଏଣ୍ଟ | 20 |
|---|