Cross-site Scripting (XSS) - Stored in bigprof-software/online-invoicing-system


Reported on

Jul 2nd 2021


xss via groupname


latest version as of 1/7/21


xss allow to execute arbitary javascript in vicitm account


1. first goto http://localhost/online-invoice2/app/admin/pageEditGroup.php and add a new group and put bellow xss payload in group-name.
payload--->group1"'><img src=x onerror=alert()>.
2. Now add a new user to this group . lets assume the added userid is user1 .
Now visit url http://localhost/online-invoice2/app/admin/pageEditMemberPermissions.php?memberID=user1 and see xss is executed.
In this url change memberID parameter value with above userid .

We have contacted a member of the bigprof-software/online-invoicing-system team and are waiting to hear back 2 years ago
BigProf Software validated this vulnerability 2 years ago
ranjit-git has been awarded the disclosure bounty
The fix bounty is now up for grabs
BigProf Software marked this as fixed with commit 6c3dbf 2 years ago
BigProf Software has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation