Customer support system 1.0 description stored xss in the admin panel Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2020-11-11 |
Type : webapps |
Platform : php
This exploit / vulnerability Customer support system 1.0 description stored xss in the admin panel is for educational purposes only and if it is used you will do on your own risk!
[+] Code ...
# Exploit Title: Customer Support System 1.0 - 'description' Stored XSS in The Admin Panel
# Date: 2020-11-11
# Exploit Author: Ahmed Abbas
# Vendor Homepage: https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html
# Software Link: https://www.sourcecodester.com/download-code?nid=14587&title=Customer+Support+System+using+PHP%2FMySQLi+with+Source+Code
# Version: 1.0
# Tested On: Windows 10 Pro 1909 (x64_86) + XAMPP 7.4.4
Stored XSS Reproduction Steps:
1. Navigate to http://TARGET/customer_support/index.php?page=department_list
2. Click on new Department
3. Add the XSS payload into the "description" parameter value
4. Browse to the post to trigger the XSS payload