header-logo
Suggest Exploit
vendor:
Bakeshop Online Ordering System
by:
Parshwa Bhavsar
8.8
CVSS
HIGH
Persistent Cross-site scripting
79
CWE
Product Name: Bakeshop Online Ordering System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:bakeshop_online_ordering_system
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10/XAMPP
2020

Bakeshop Online Ordering System 1.0 – ‘Owner’ Persistent Cross-site scripting

A persistent cross-site scripting vulnerability exists in Bakeshop Online Ordering System 1.0. An attacker can inject malicious JavaScript code into the 'Category' input field of the 'Categories' page in the admin dashboard. When a user visits the page, the malicious code will be executed in the user's browser.

Mitigation:

Input validation should be used to prevent malicious code from being injected into the 'Category' input field.
Source

Exploit-DB raw data:

# Exploit Title: Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting
# Date: 26-11-2020
# Exploit Author: Parshwa Bhavsar
# Vendor Homepage: https://www.sourcecodester.com/
# Software Link: https://www.sourcecodester.com/php/14609/bakeshop-online-ordering-system-phpmysqli-full-source-code.html
# Version: 1.0
# Tested on: Windows 10/XAMPP

Payload : "><img src=x onerror=alert(1)>


Steps to Reproduce :-

1. Login in admin dashboard & Click on 'Categories'.
2. You will notice the "New" button ,Click on that and You will notice the "Category" input field.
3. Put  XSS Payload on that field and save it.
4. XSS will be triggered.