Advertisement






Regis Inventory And Monitoring System 1.0 Cross Site Scripting

CVE Category Price Severity
CVE-2021-31772 CWE-79 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2021-03-27
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021030184

Below is a copy:

Regis Inventory And Monitoring System 1.0 Cross Site Scripting
# Title: Regis Inventory And Monitoring System 1.0 - 'Item List' Stored XSS
# Exploit Author: George Tsimpidas
# Date: 2021-03-25
# Vendor Homepage: www.sourcecodester.com
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/regis_inventory.zip
# Version : 1.0.0
# Tested on: Kali Linux 2020.4
# Category: Webapp

# Description

Regis Inventory And Monitoring System, suffers from a stored cross site scripting on Item's List Category

#PoC

1. Login as admin : http://localhost/regis_inventory/index.php
2. Visit : http://localhost/regis_inventory/item.php
3. Click add a New Item and input your payload on "Generic Name" textbox.

Payload : <script>alert("XSS")</script>

4. After inputting the Item values and submitting the form, it will trigger an XSS pop-up

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.