Advertisement






Gastro - Restaurant Extension for NexoPOS v2.3.34 Stored XSS Injection

CVE Category Price Severity
N/A CWE-79 (Improper Neutralization of Input During Web Page Generation) N/A High
Author Risk Exploitation Type Date
Not specified High Remote 2019-04-23
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N 0 0

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019040206

Below is a copy:

Gastro - Restaurant Extension for NexoPOS v2.3.34 Stored XSS Injection
[*] :: Title: Gastro - Restaurant Extension for NexoPOS v2.3.34 Stored XSS Injection
[*] :: Author: QUIXSS
[*] :: Date: 2019-04-23
[*] :: Software: Gastro - Restaurant Extension for NexoPOS v2.3.34
  
[?] :: Technical Details & Description:
# Weak security measures like bad input fields data filtering has been discovered in the Gastro - Restaurant Extension for NexoPOS. Current version of this web-application is 2.3.34.

[?] :: Demo Website:
# https://codecanyon.net/item/gastro-restaurant-extension-for-nexopos/20242963
# Backend: http://tendoo.org/gastro/dashboard
# Login: admin, Password: 123456

[!] :: Special Note:
# Author of this web-application was warned twice about bad security measures. Nothing has changed.

[!] :: PoC Stored XSS Injections:
# http://tendoo.org/gastro/dashboard/users/profile
# http://tendoo.org/gastro/dashboard/nexo/orders

[+] :: PoC [Stored XSS Injection]:
# Authorize on the demo website for tests: http://tendoo.org/gastro/sign-in/ (login / password is admin / 123456). Then go to any page u want, f.e. http://tendoo.org/gastro/dashboard/users/profile and save your payload inside field First Name or Last Name. Almost each input field is vulnerable for Stored XSS Injection.
# Sample payload: "><script>alert('QUIXSS')</script>

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.