Lucene search

K
packetstormSimran SankhalaPACKETSTORM:160107
HistoryNov 17, 2020 - 12:00 a.m.

Grocy Household Management Solution 2.7.1 Cross Site Scripting

2020-11-1700:00:00
Simran Sankhala
packetstormsecurity.com
563
grocy household management
xss
add recipe
version 2.7.1
cve-2020-25454
proof of concept

EPSS

0.001

Percentile

19.8%

`# Exploit Author: Simran Sankhala  
# Vendor Homepage: https://berrnd.de/  
# Software Link: https://github.com/grocy/grocy  
# Version: 2.7.1  
# Tested on: Kali Linux 2020.3  
# CVE ID Alloted : CVE-2020-25454  
# Proof Of Concept:  
  
grocy household management solution v2.7.1, allows stored XSS , via Add recipe module, that is rendered upon deleting that Recipe .  
  
To exploit this vulnerability:  
  
1. Login to the application  
2. Go to Recipe t' module  
3. Click on 'add New recipe ' module  
4. Enter the payload: <script>alert("xss") in 'Name' and to the description section in the input field.  
5. Click Save  
6. Click 'Delete Recipe' , the payload gets executed.  
  
`

EPSS

0.001

Percentile

19.8%

Related for PACKETSTORM:160107