Headline
CVE-2022-3503: Exploit/PoC at main · DisguisedRoot/Exploit
A vulnerability was found in SourceCodester Purchase Order Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the component Supplier Handler. The manipulation of the argument Supplier Name/Address/Contact person/Contact leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-210832.
Permalink
# Exploit Title: Purchase Order Management System - Multiple Persistent XSS
# Exploit Author: Kshitij Rewandkar
# Vendor Name: oretnom23
# Vendor Homepage: https://www.sourcecodester.com/php/14935/purchase-order-management-system-using-php-free-source-code.html
# Software Link: https://www.sourcecodester.com/php/14935/purchase-order-management-system-using-php-free-source-code.html
# Version: v1.0
# Tested on: Windows 11, Apache
Description:
A Persistent XSS issue in Purchase Order Management System v1.0 allows to inject Arbitrary JavaScript in Multiple Supplier create Parameter.
Parameters Vulnerable:
A) Supplier Name
B) Address
C) Contact person
D) Contact
Payload:
<script>confirm(1)</script>
Steps:
Login into your account
Now go to “Supplier List” and create a new file.
Now put the payload in the below parameter:
A) Supplier Name
B) Address
C) Contact person
D) Contact
Payload: <script>confirm(1)</script>
- Now save the details and our payload has been executed