Hospitals Patient Records Management System 1.0 – ‘room_types’ Stored Cross Site Scripting (XSS)

  • 作者: Sant268
    日期: 2022-01-13
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/50656/
  • # Exploit Title: Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS)
    # Exploit Author: (Sant268)
    # Vendor Homepage: https://www.sourcecodester.com/
    # Software Link: https://www.sourcecodester.com/php/15116/hospitals-patient-records-management-system-php-free-source-code.html
    # Version: HPRMS 1.0
    # Tested on: Ubuntu 20, Apache
    
    - Description:
    A XSS issue in HPRMS v.1.0 allows remote attackers to inject JavaScript via /articles in the description parameter.
    
    - Payload used:
    <img src =q onerror=prompt(8)>
    
    - Steps to reproduce:
    1- Go to http://victim.com/admin/?page=room_types
    2- Add Room type, paste the payload in description
    3- Alert will pop whenever the page is accessed.