header-logo
Suggest Exploit
vendor:
Equipment Inventory System
by:
Jitendra Kumar Tripathi
6.4
CVSS
MEDIUM
Stored XSS
79
CWE
Product Name: Equipment Inventory System
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:equipment_inventory_system:1.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 + Xampp 8.0.3
2020

Equipment Inventory System 1.0 – ‘multiple’ Stored XSS

Log in with a valid username and password. Navigate to http://localhost/deped/admin/item.php and add an item with the payload <script>alert(1)</script>. Navigate to http://localhost/deped/admin/employee.php and add an employee with the payload <script>alert(2)</script>. Post saved successfully, reload the page or navigate to any page and the XSS will be triggered.

Mitigation:

Input validation should be used to prevent XSS attacks. Sanitize user input and escape output to prevent malicious code from being executed.
Source

Exploit-DB raw data:

# Exploit Title: Equipment Inventory System 1.0 - 'multiple' Stored XSS
# Exploit Author: Jitendra Kumar Tripathi
# Vendor Homepage: https://www.sourcecodester.com/php/11327/equipment-inventory.html
# Software Link: https://www.sourcecodester.com/download-code?nid=11327&title=Equipment+Inventory+System+using+PHP+with+Source+Code
# Version: 1
# Tested on Windows 10 + Xampp 8.0.3

Vulnerable Parameters: Item List , Employee Details , Position of Employee

*Steps to reproduce:*
1: Log in with a valid username and password. 

2: Navigate to http://localhost/deped/admin/item.php
   Add Item 
   Payload : <script>alert(1)</script>

   Navigate to http://localhost/deped/admin/employee.php
   Add Employee
   Payload : <script>alert(2)</script>
   
   Post Saved Sucessfully , reload your page or navigate to any page you will see these XSS triggered.