Cross-site Scripting (XSS) - Stored in bigprof-software/online-invoicing-system

Valid

Reported on

Jul 3rd 2021


✍️ Description

There is a Stored XSS on the user profile edit page which occurs due to improper sanitization of the Address field as tested on the latest release.

🕵️‍♂️ Proof of Concept

Step to Reproduce:

Go to /items_view.php and add the payload: "><svg/onload=prompt("poc_by_delta")>"@x.y as Item Description and add required data and save

Now the page gets redirected and shows Item details under it click Invoice items and fill the required ie, unit price

Visit /summary-reports-invoice_items-0.php to see the xss pop up

Note: If you already had an item with an invoice added, you can just rename the item Description to the payload as I did it in the poc video!!

poc video: https://drive.google.com/file/d/1_uDSfm6siKptkQs2Ywc75O74_xefHwiK/view?usp=sharing

💥 Impact

Stored xss

We have contacted a member of the bigprof-software/online-invoicing-system team and are waiting to hear back a year ago
BigProf Software validated this vulnerability a year ago
D3lT4 has been awarded the disclosure bounty
The fix bounty is now up for grabs
BigProf Software confirmed that a fix has been merged on 953bb2 a year ago
BigProf Software has been awarded the fix bounty
to join this conversation