In Simple Food Website 1.0, a moderation can put the Cross Site Scripting Payload in any of the fields on http://127.0.0.1:1234/food/admin/all_users.php like Full Username, etc .This causes stored xss.
References
Link | Resource |
---|---|
https://github.com/offsecin/bugsdisclose/blob/main/xss | Exploit Third Party Advisory |
https://www.sourcecodester.com/php/12510/simple-food-website-php.html | Exploit Third Party Advisory |
https://github.com/offsecin/bugsdisclose/blob/main/xss | Exploit Third Party Advisory |
https://www.sourcecodester.com/php/12510/simple-food-website-php.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/offsecin/bugsdisclose/blob/main/xss - Exploit, Third Party Advisory | |
References | () https://www.sourcecodester.com/php/12510/simple-food-website-php.html - Exploit, Third Party Advisory |
Information
Published : 2022-05-23 21:16
Updated : 2024-11-21 07:02
NVD link : CVE-2022-30015
Mitre link : CVE-2022-30015
CVE.ORG link : CVE-2022-30015
JSON object : View
Products Affected
simple_food_website_project
- simple_food_website
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')