Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-3949 PoC — Simple Cashiering System 跨站脚本漏洞

Source
Associated Vulnerability
Title:Simple Cashiering System 跨站脚本漏洞 (CVE-2022-3949)
Description:Simple Cashiering System是Carlo Montero个人开发者的一个简单的开源收银系统。用于帮助企业管理他们的日常交易。 Simple Cashiering System存在安全漏洞,该漏洞源于用户帐户处理程序的某些未知处理,攻击者利用该漏洞可以通过操作参数 fullname导致跨站脚本 (XSS)。
Description
XSS in Simple Cashiering System
Readme
# CVE-2022-3949
XSS in Simple Cashiering System


Simple Cashiering System is vulnerable to Cross Site Scripting (XSS) - a malicious actor can change the fullname of a compromised user to a XSS Payload and whenever a admin visits the user-tab or the sales tab (and looks into sales made by the malicious actor) the payload is triggered. This can lead to session takeover because the cookie does not have an HttpOnly Flag. 

How-to Reproduce:
* Download https://www.sourcecodester.com/php/14945/simple-cashiering-system-pos-php-and-sqlite-source-code-free-download.html
* setup web server with php + sqlite3 and copy the application to the webserver
* login as user and change your fullname to <script>javascript:alert(document.cookie)</script>
* login as an admin user and visit the user tab of the admin dashboard
* XSS is triggered
<img width="797" alt="step1" src="https://user-images.githubusercontent.com/20245897/201341015-7bec2a98-40d7-4188-8d5c-404a24d10255.png">
<img width="723" alt="step2" src="https://user-images.githubusercontent.com/20245897/201341056-8a6134c8-861b-4fe5-b8f7-4a3f98da4000.png">
File Snapshot

[4.0K] /data/pocs/54a37b32d58f81bc8f5b23801ba30448433c78b8 └── [1.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.