Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
Change Mirror[11] Download[12]
# Exploit Title: Travelable 1.0 - Stored XSS
# Exploit Author: CraCkEr
# Date: 15/07/2023
# Vendor: travelmate.com
# Vendor Homepage: https://www.codester.com/items/43963/travelable-trek-management-solution
# Software Link: https://travel.codeswithbipin.com/
# Tested on: Windows 10 Pro
# Impact: Manipulate the content of the site
## Description
Allow Attacker to inject malicious code into website, give ability to steal sensitive
information, manipulate data, and launch additional attacks.
Path: /[random-number]/comment
POST parameter 'comment' is vulnerable to XSS
-----------------------------------------------------------
POST /[random-number]/comment HTTP/2
_token=10Mh1zuuVXB1iH3QsrEOqpWGOXogEv38WPwqGtv6&name=cracker+infosec&email=cracker%40infosec.com&phone=%2B96171951951&comment=[XSS Payload]
-----------------------------------------------------------
## Steps to Reproduce:
1. Surf as a (Guest User)
2. Go to [Tour Packages] on this Path: https://website/packages
3. Choose any package and click [Explore] Path: https://website/package/6
4. Scroll Down to the [Comments] section
5. Inject your XSS Payload in [Comment Box]
6. Click on [Submit]
7. Every visitor to the page where you inject your [XSS Payload] - Path: https://website/package/6
8. XSS will fire and execute on his browser.
[-] Done
File Tags
- ActiveX[18] (932)
- Advisory[19] (81,658)
- Arbitrary[20] (16,147)
- BBS[21] (2,859)
- Bypass[22] (1,730)
- CGI[23] (1,025)
- Code Execution[24] (7,228)
- Conference[25] (678)
- Cracker[26] (841)
- CSRF[27] (3,333)
- DoS[28] (23,329)
- Encryption[29] (2,364)
- Exploit[30] (51,562)
- File Inclusion[31] (4,207)
- File Upload[32] (963)
- Firewall[33] (821)
- Info Disclosure[34] (2,750)
- Intrusion Detection[35] (889)
- Java[36] (3,007)
- JavaScript[37] (851)
- Kernel[38] (6,628)
- Local[39] (14,425)
- Magazine[40] (586)
- Overflow[41] (12,638)
- Perl[42] (1,423)
- PHP[43] (5,138)
- Proof of Concept[44] (2,337)
- Protocol[45] (3,574)
- Python[46] (1,530)
- Remote[47] (30,638)
- Root[48] (3,575)
- Rootkit[49] (508)
- Ruby[50] (612)
- Scanner[51] (1,635)
- Security Tool[52] (7,871)
- Shell[53] (3,172)
- Shellcode[54] (1,212)
- Sniffer[55] (894)
- Spoof[56] (2,194)
- SQL Injection[57] (16,294)
- TCP[58] (2,396)
- Trojan[59] (687)
- UDP[60] (885)
- Virus[61] (664)
- Vulnerability[62] (31,680)
- Web[63] (9,616)
- Whitepaper[64] (3,747)
- x86[65] (961)
- XSS[66] (17,839)
- Other[67]
File Archives
- July 2023[68]
- June 2023[69]
- May 2023[70]
- April 2023[71]
- March 2023[72]
- February 2023[73]
- January 2023[74]
- December 2022[75]
- November 2022[76]
- October 2022[77]
- September 2022[78]
- August 2022[79]
- Older[80]
Systems
- AIX[81] (428)
- Apple[82] (1,993)
- BSD[83] (373)
- CentOS[84] (57)
- Cisco[85] (1,922)
- Debian[86] (6,791)
- Fedora[87] (1,691)
- FreeBSD[88] (1,244)
- Gentoo[89] (4,321)
- HPUX[90] (879)
- iOS[91] (349)
- iPhone[92] (108)
- IRIX[93] (220)
- Juniper[94] (67)
- Linux[95] (46,159)
- Mac OS X[96] (685)
- Mandriva[97] (3,105)
- NetBSD[98] (256)
- OpenBSD[99] (483)
- RedHat[100] (13,535)
- Slackware[101] (941)
- Solaris[102] (1,610)
- SUSE[103] (1,444)
- Ubuntu[104] (8,744)
- UNIX[105] (9,264)
- UnixWare[106] (186)
- Windows[107] (6,561)
- Other[108]
- Services
- Security Services[119]
- Hosting By
- Rokasec[120]