| पदवी | Human Resource Management System v1.0 - Stored XSS |
|---|
| वर्णन | # Exploit Title: Human Resource Management System - Stored XSS
# Exploit Author: Pratik Shetty
# Vendor Name: oretnom23
# Vendor Homepage: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html
# Software Link: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html
# Version: v1.0
# Tested on: Windows 10, Apache
Description: A Stored XSS issue in Human Resource Management System v.1.0 allows to inject Arbitrary JavaScript in Edit in "First Name", " Middle Name " and "Last Name".
Payload:
<script>confirm(1)</script>
Steps:
1) Login into your admin account
2) Now in that go to "Add Employee"
3) In that fill the details but in "First Name" , "Middle Name" and "Last Name" put your payload
Payload: <script>confirm(1)</script>
4) Now save the details of that employee
5) Now go to "Employee New" Tab and our payload has been executed |
|---|
| उपयोगकर्ता | draco (UID 24011) |
|---|
| आधीनता | 13/10/2022 03:19 PM (3 वर्षानुवर्षे ago) |
|---|
| नेमस्तपणा | 13/10/2022 04:56 PM (2 hours later) |
|---|
| स्थान | मान्य केले |
|---|
| VulDB entry | 210773 [SourceCodester Human Resource Management System 1.0 Add Employee First Name/Middle Name/Last Name क्रॉस साइट स्क्रिप्टिंग] |
|---|
| मुद्दे | 17 |
|---|