lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 10 Dec 2020 19:06:49 +0530
From: krishna yadav <kisna1993yadav@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] Stored XSS in Online bus booking system

Dear Team,

Please find attached POC and detailed information about the stored XSS.

# Exploit Title: online bus booking system project using PHP MySQL - Stored
cross-site scripting
# Exploit Author: Krishna Yadav
# Vendor Homepage: https://www.sourcecodester.com
# Software Link:
https://www.sourcecodester.com/php/14438/online-bus-booking-system-project-using-phpmysql.html
# Version: 1.0
# Tested on Windows 10/Kali Linux
# Contact: https://www.linkedin.com/in/krishna-yadav-85aa34b2/

Stored cross-site scripting:
Stored attacks are those where the injected script is permanently stored on
the target servers, such as in a database, in a message forum, visitor log,
comment field, etc. The victim then retrieves the malicious script from the
server when it requests the stored information. Stored XSS is also
sometimes referred to as Persistent or Type-I XSS.

Attack Vector:
online bus booking system project using PHP MySQL version 1.0 is vulnerable
to stored XSS. the home page is vulnerable to XSS.

Vulnerable Parameter: http://localhost:85/bus_booking/index.php?page=
<Payload>

Payload:
%22%3E%3C/\/\%3C/script%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E

Thanks & Regards,
Krishna Yadav
Mob No. +91 8169434641

Download attachment "xss.png" of type "image/png" (25160 bytes)


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ