# Exploit Title: SASS BILLER 1.0 - Stored XSS # Exploit Author: CraCkEr # Date: 12/07/2023 # Vendor: Bug Finder # Vendor Homepage: https://bugfinder.net/ # Software Link: https://bugfinder.net/product/sass-biller-a-sass-based-invoicing-and-billing-platform/19 # Tested on: Windows 10 Pro # Impact: Manipulate the content of the site ## Description Allow Attacker to inject malicious code into website, give ability to steal sensitive information, manipulate data, and launch additional attacks. Path: /sassbiller/company/store POST parameter 'name' is vulnerable to XSS ----------------------------------------------------------- POST /sassbiller/company/store HTTP/2 Content-Disposition: form-data; name="name" ----------------------------------------------------------- ## Steps to Reproduce: 1. Login as (Normal User) 2. Go to [Company] on this Path: https://website/sassbiller/company/list 3. Click on [Add company] 4. Inject your XSS Payload in [name] and fill out all the other required fields 5. Click on [Add company] 6. When ADMIN visit [Company List] on this Path: https://website/sassbiller/admin/company/list 7. XSS Will Fire and Executed on his Browser [-] Done