33 lines
No EOL
1.2 KiB
Text
33 lines
No EOL
1.2 KiB
Text
# Exploit Title: Customer Relationship Management (CRM) System 1.0 - 'Category' Persistent Cross site Scripting
|
|
# Date: 14-05-2021
|
|
# Exploit Author: Vani K G
|
|
# Vendor Homepage: https://www.sourcecodester.com/
|
|
# Software Link: https://www.sourcecodester.com/php/14794/customer-relationship-management-crm-system-php-source-code.html
|
|
# Version: 1.0
|
|
# Tested on: Windows 10/XAMPP
|
|
|
|
Stored Cross-site scripting(XSS):
|
|
Stored XSS, also known as persistent XSS, is the more damaging of the
|
|
two. It occurs when a malicious script is injected directly into a
|
|
vulnerable web application.
|
|
|
|
Attack Vector :
|
|
|
|
This vulnerability can result in the attacker to inject the XSS
|
|
payload in the Title field of the page and each time any user will
|
|
open the website, the XSS triggers and attacker can able to steal the
|
|
cookie according to the crafted payload.
|
|
|
|
Vulnerable Parameters: Category input field.
|
|
|
|
Payload : <script>alert(document.domain)</script>
|
|
|
|
Vulnerable URL :
|
|
http://localhost/crm/admin/?page=services&view=category
|
|
|
|
Steps To Reproduce :
|
|
1) Go to the admin Dashboard
|
|
2) Click on Category and click Add New button.
|
|
3) Put Payload into the 'Category' input field.
|
|
4) Click on Save.
|
|
5) XSS payload will be triggered. |