Share
## https://sploitus.com/exploit?id=PACKETSTORM:160107
# Exploit Author: Simran Sankhala  
# Vendor Homepage: https://berrnd.de/  
# Software Link: https://github.com/grocy/grocy  
# Version: 2.7.1  
# Tested on: Kali Linux 2020.3  
# CVE ID Alloted : CVE-2020-25454  
# Proof Of Concept:  
  
grocy household management solution v2.7.1, allows stored XSS , via Add recipe module, that is rendered upon deleting that Recipe .  
  
To exploit this vulnerability:  
  
1. Login to the application  
2. Go to Recipe t' module  
3. Click on 'add New recipe ' module  
4. Enter the payload: <script>alert("xss") in 'Name' and to the description section in the input field.  
5. Click Save  
6. Click 'Delete Recipe' , the payload gets executed.