Skip to content

Latest commit

 

History

History
42 lines (22 loc) · 1.7 KB

Prison Management System(XSS).md

File metadata and controls

42 lines (22 loc) · 1.7 KB

Prison Management System - system_info 'name' Stored Cross-Site Scripting(XSS)

Exploit Title: Prison Management System - system_info 'name' Stored Cross-Site Scripting(XSS)

Exploit Author: webraybtl@webray.com.cn inc

Version: Prison Management System 1.0

Tested on: Windows Server 2008 R2 Enterprise, Apache ,Mysql

Description

Persistent XSS (or Stored XSS) attack is one of the three major categories of XSS attacks, the others being Non-Persistent (or Reflected) XSS and DOM-based XSS. In general, XSS attacks are based on the victim’s trust in a legitimate, but vulnerable, website or web application.Prison Management System does not filter the content correctly at the "name" parameter, resulting in the generation of stored XSS.

Payload used:

<img src="" onerror="alert(111111111)">

Proof of Concept

  1. Login the CMS. Admin Default Access: username: admin Password: admin123

  2. Open Page http://192.168.67.5/pms/admin/?page=system_info

    image-20220607095010559

  3. Put XSS payload in the content box and click on Update to publish the page ;

    image-20220607095053168

  4. We can see the alert.;

    image-20220607095108525