ଜମା କରନ୍ତୁ #48136: Purchase Order Management System - Multiple Persistent XSSସୂଚନା

ଶୀର୍ଷକPurchase Order Management System - Multiple Persistent XSS
ବର୍ଣ୍ଣନା# Exploit Title: Purchase Order Management System - Multiple Persistent XSS # Exploit Author: Kshitij Rewandkar # Vendor Name: oretnom23 # Vendor Homepage: https://www.sourcecodester.com/php/14935/purchase-order-management-system-using-php-free-source-code.html # Software Link: https://www.sourcecodester.com/php/14935/purchase-order-management-system-using-php-free-source-code.html # Version: v1.0 # Tested on: Windows 11, Apache Description: A Persistent XSS issue in Purchase Order Management System v1.0 allows to inject Arbitrary JavaScript in Multiple Supplier create Parameter. Parameters Vulnerable: A) Supplier Name B) Address C) Contact person D) Contact Payload: <script>confirm(1)</script> Steps: 1) Login into your account 2) Now go to "Supplier List" and create a new file. 3) Now put the payload in the below parameter: A) Supplier Name B) Address C) Contact person D) Contact Payload: <script>confirm(1)</script> 4) Now save the details and our payload has been executed
ଉତ୍ସ⚠️ https://github.com/DisguisedRoot/Exploit/blob/main/Persistent%20XSS/PoC
ଉପଭୋକ୍ତା
 DisguisedRoot (UID 33702)
ଦାଖଲ10/13/2022 08:37 PM (3 ବର୍ଷ ବର୍ଷ ago)
ମଧ୍ୟମ ଧରଣର10/14/2022 09:05 AM (12 hours later)
ସ୍ଥିତିଗ୍ରହଣ କରାଯାଇଛି
VulDB ଏଣ୍ଟ୍ରି210832 [SourceCodester Purchase Order Management System 1.0 Supplier Supplier Name/Address/Contact person/Contact କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ]
ପଏଣ୍ଟ20

Do you want to use VulDB in your project?

Use the official API to access entries easily!