Fast Food Ordering System 1.0 Cross-Site Scripting

CYBERTHOTH
May 30, 2022

--

Vulnerable Parameters: Body.

Create a New List

Attack Vector:
This vulnerability can results attacker to inject the XSS payload into the Description box and each time
any user will go to that LIST, the XSS triggers, and the attacker can able to steal the cookie according to the crafted payload.

POC :

1

Enter the payload and save it

2

Payload trigger and it pops up the PHP cookie as shown in the evidence

Steps-To-Reproduce:
1. Login into Fast Food Ordering System CMS admin panel.
2. Now go to the Master List > Category List> Create New.
3. Now paste the below payload in the Description field.
Ashish “><img src=”” onerror=”alert(document.cookie)”>
4. Now click on the save button.
5. The XSS will be triggered.

Stored Cross-site scripting(XSS):
Stored XSS, also known as persistent XSS, is the more damaging of the two. It occurs when a malicious script is injected directly into a vulnerable web application.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

CYBERTHOTH
CYBERTHOTH

Written by CYBERTHOTH

InfoSec Practitioner, Hobbyist Hacker, Perpetual learner.

No responses yet

Write a response