Seat Reservation System 1.0 Cross Site Scripting
2020-10-10 04:22:18 Author: cxsecurity.com(查看原文) 阅读量:170 收藏

# Exploit Title: Seat Reservation System 1.0 Persistent Cross-Site Scripting # Date: 10-08-2020 # Exploit Author: George Tsimpidas # Vendor Homepage: www.sourcecodester.com # Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/seat-reservation-system-using-php_0.zip # Version: 1.0 # Tested on: Ubuntu 18.04.5 LTS (Bionic Beaver) # Category: Webapp Description : The file movie_list.php does not sanitize correctly the description drop down menu on the edit mode, therefore it echoes out the data on the parsed ID number of the current indicated movie. Culprit : ######################################################################### <div class="dropdown-menu"> <a class="dropdown-item edit_movie" href="javascript:void(0)" data-id = '<?php echo $row['id'] ?>'>Edit</a> ######################################################################### PoC : 1. Navigate on the admin panel and login : http://localhost/seat_reservation/admin/ 2. Go under the category Movie List 3. Click on Edit, and change the description of the Movie "The Matrix" 4. Apply on the description the below payload : <script>alert("XSS")</script> 5. Click save, and visit the main menu : http://localhost/seat_reservation/ 6. Locate the movie " The Matrix " and click Reserve Seat You will be granted with a Cross Site Scripting Alert.



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2020100062
如有侵权请联系:admin#unsafe.sh