32 lines
No EOL
1.1 KiB
Text
32 lines
No EOL
1.1 KiB
Text
# Exploit Title: Simple Chatbot Application 1.0 - 'Category' Stored Cross site Scripting
|
|
# Date: 16-05-2021
|
|
# Exploit Author: Vani K G
|
|
# Vendor Homepage: https://www.sourcecodester.com/
|
|
# Software Link: https://www.sourcecodester.com/php/14788/simple-chatbot-application-using-php-source-code.html
|
|
# Version: 1.0
|
|
# Tested on: Windows 10/XAMPP
|
|
|
|
Stored Cross-site scripting(XSS):
|
|
Stored XSS, also known as persistent XSS, is the more damaging of the
|
|
two. It occurs when a malicious script is injected directly into a
|
|
vulnerable web application.
|
|
|
|
Attack Vector :
|
|
|
|
This vulnerability can result in the attacker to inject the XSS
|
|
payload in the Title field of the page and each time any user will
|
|
open the website, the XSS triggers and attacker can able to steal the
|
|
cookie according to the crafted payload.
|
|
|
|
Vulnerable Parameters: Settings System Info field
|
|
Payload : <script>alert(1)</script>
|
|
|
|
Vulnerable URL :
|
|
http://localhost/chatbot/admin/?page=system_info
|
|
|
|
Steps To Reproduce :
|
|
1) Go to the admin Dashboard
|
|
2) Click on Settings and Select System Info.
|
|
3) Put Payload into the System name input field.
|
|
4) Click on Save.
|
|
5) XSS payload will be triggered. |