18 lines
No EOL
1,019 B
Text
18 lines
No EOL
1,019 B
Text
# Exploit Title: Point of Sale System 1.0 - Multiple Stored XSS
|
|
# Exploit Author: Saeed Bala Ahmed (r0b0tG4nG)
|
|
# Date: 2020-12-18
|
|
# Vendor Homepage: https://www.sourcecodester.com/php/9620/point-sale-system-pos.html
|
|
# Software Link: https://www.sourcecodester.com/download-code?nid=9620&title=Point+of+Sale+System+%28POS%29+using+PHP+with+Source+Code
|
|
# Affected Version: Version 1
|
|
# Tested on: Parrot OS
|
|
|
|
Step 1. Login to the application with admin credentials
|
|
|
|
Step 2. Click on "Suppliers" in header and select "Add Supplier".
|
|
|
|
Step 3. Input "<script>alert("r0b0tG4nG")</script>" in all fields of the form.
|
|
Note: Stored XSS vulnerability can also be found "Customers Page" when you select "Add New Customer". Apply Same method above to execute Stored XSS.
|
|
|
|
Step 4. Click on "Save" when done and this will trigger the Stored XSS payloads. Whenever you click on "Suppliers Page", your XSS Payloads will be triggered.
|
|
|
|
Note: Stored XSS can also be triggered when you click on "Products Page" and select "Add New Product". |