Skip to content

Instantly share code, notes, and snippets.

@Arajawat007
Last active September 14, 2023 07:50
Show Gist options
  • Save Arajawat007/e37a131fd7b5f90148fa091a42de8f9d to your computer and use it in GitHub Desktop.
Save Arajawat007/e37a131fd7b5f90148fa091a42de8f9d to your computer and use it in GitHub Desktop.
CVE-2023-42253
Exploit Title: Vehicle Management In PHP With Source Code - XSS Cross Site Scripting
Vendor Homepage: https://code-projects.org/
Software Link: https://code-projects.org/vehicle-management-in-php-with-source-code/
Tested On: Linux
Attack type: Local
Steps to Reproduce -
1. Visit https://localhost/vehicle
2. Click on "Menu"
3. After clicking on "Menu" click on "Add Accounts" then we'll redirect to URL: https://localhost/vehicle/add.php
4. Use this payload: <script>alert(123)</script>
5. Use XSS payload ( <script>alert(123)</script> ) put payload in "Invioce No" , "To" , and "Mammul" Section
6. Click on Continue
7. It reflected the value of 123.
Reference: CVE-2023-42253
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment