Skip to content

Instantly share code, notes, and snippets.

@Arajawat007
Last active September 14, 2023 07:51
Show Gist options
  • Save Arajawat007/114607a6ff8859081f241ad7342e7729 to your computer and use it in GitHub Desktop.
Save Arajawat007/114607a6ff8859081f241ad7342e7729 to your computer and use it in GitHub Desktop.
CVE-2023-42254
Exploit Title: Vehicle Management In PHP With Source Code - XSS Cross Site Scripting
Vendor Homepage: https://code-projects.org/
Software Link: https://code-projects.org/vehicle-management-in-php-with-source-code/
Tested On: Linux
Attack type: Local
Steps to Reproduce -
1. Visit https://localhost/vehicle
2. Click on "Menu"
3. After clicking on "Menu" click on "Add Accounts" then we'll redirect to URL: https://localhost/vehicle/add.php
4. Use this payload: <script>alert(123)</script>
5. Use XSS payload ( <script>alert(123)</script> ) put payload in "Remark" and "Commision" Section
6. Click on Continue
7. It reflected the value of 123.
Reference: CVE-2023-42254
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment