header-logo
Suggest Exploit
vendor:
Petrol Pump Management Software
by:
Shubham Pandey
4.1
CVSS
MEDIUM
Cross Site Scripting (XSS)
79
CWE
Product Name: Petrol Pump Management Software
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: CVE-2024-27743
CPE: a:petrol_pump_management_software:1.0
Metasploit:
Other Scripts:
Platforms Tested: Windows, Linux
2024

Petrol Pump Management Software v1.0 – ‘Address’ Stored Cross Site Scripting

A Cross Site Scripting (XSS) vulnerability in Petrol Pump Management Software v1.0 allows attackers to execute malicious code by inserting a specially crafted payload into the 'Address' parameter in the add_invoices.php component.

Mitigation:

To mitigate this vulnerability, input validation and output encoding should be implemented to sanitize user-supplied data before displaying it.
Source

Exploit-DB raw data:

# Exploit Title: Petrol Pump Management Software v1.0 - 'Address' Stored Cross Site Scripting
# Date: 01-03-2024
# Exploit Author: Shubham Pandey
# Vendor Homepage: https://www.sourcecodester.com
# Software Link: https://www.sourcecodester.com/php/17180/petrol-pump-management-software-free-download.html
# Version: 1.0
# Tested on: Windows, Linux
# CVE : CVE-2024-27743
# Description: Cross Site Scripting vulnerability in Petrol Pump Management Software v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the Address parameter in the add_invoices.php component.
# POC:
1. Here we go to : http://localhost/fuelflow/index.php
2. Now login with default username=mayuri.infospace@gmail.com and
Password=admin
3. Now go to "http://localhost/fuelflow/admin/add_invoices.php"
4. Fill the payload "<script>alert(0)</script>" in "Address" field
5. Stored XSS will be present in "
http://localhost/fuelflow/admin/manage_invoices.php" page
# Reference:
https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md