Exploit/Advisories no image

Published on March 5th, 2024 📆 | 7019 Views ⚑

0

Petrol Pump Management Software 1.0 Cross Site Scripting – Torchsec


iSpeech

# Exploit Title: Cross Site Scripting vulnerability in Petrol Pump Management Software v.1.0
# Date: 01-03-2024
# Exploit Author: Shubham Pandey
# Vendor Homepage: https://www.sourcecodester.com
# Software Link: https://www.sourcecodester.com/php/17180/petrol-pump-management-software-free-download.html
# Version: 1.0
# Tested on: Windows, Linux
# CVE : CVE-2024-27743
# Description: Cross Site Scripting vulnerability in Petrol Pump Management
Software v.1.0 allows an attacker to execute arbitrary code via a crafted
payload to the Address parameter in the add_invoices.php component.
# POC:
1. Here we go to : http://localhost/fuelflow/index.php
2. Now login with default username=mayuri.infospace@gmail.com and
Password=admin
3. Now go to "http://localhost/fuelflow/admin/add_invoices.php"
4. Fill the payload "" in "Address" field
5. Stored XSS will be present in "
http://localhost/fuelflow/admin/manage_invoices.php" page
# Reference:
https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27743

-----

# Exploit Title: Cross Site Scripting vulnerability via SVG in Petrol Pump Management Software v.1.0
# Date: 01-03-2024
# Exploit Author: Shubham Pandey
# Vendor Homepage: https://www.sourcecodester.com
# Software Link: https://www.sourcecodester.com/php/17180/petrol-pump-management-software-free-download.html
# Version: 1.0
# Tested on: Windows, Linux
# CVE : CVE-2024-27744
# Description: Cross Site Scripting vulnerability in Petrol Pump Management
Software v.1.0 allows an attacker to execute arbitrary code via a crafted
payload to the image parameter in the profile.php component.
# POC:
1. Here we go to : http://localhost/fuelflow/index.php
2. Now login with default username=mayuri.infospace@gmail.com and
Password=admin
3. Now go to "http://localhost/fuelflow/admin/profile.php"
4. Upload the xss.svg file in "Image" field
5. Stored XSS will be present in "
http://localhost/fuelflow/assets/images/xss.svg" page
6. The content of the xss.svg file is given below:

http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
>

stroke="#004400"/>


# Reference:
https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27744





Source link

Tagged with:



Comments are closed.