Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stored XSS vulnerability in /clinics/profile.php?id={Clinic ID} #11

Open
Saud-Ahmad opened this issue Mar 31, 2021 · 2 comments
Open

Stored XSS vulnerability in /clinics/profile.php?id={Clinic ID} #11

Saud-Ahmad opened this issue Mar 31, 2021 · 2 comments

Comments

@Saud-Ahmad
Copy link

Stored XSS vulnerability in Version 2.0 which allows remote attacker to inject arbitrary script or html. This being stored, will impact all users who have permissions to view the vulnerable page.

Vulnerable Endpoint: http://localhost/RemoteClinic/clinics/profile.php?id=32 (in my case, 32 is Clinic ID).

Step To Reproduce:

  1. Login in Application as Doctor.
  2. When you scroll down the main dashboard page, there is clinics options, Click "New Clinic".

1

  1. Here is four fields vulnerable for XSS /clinics/profile.php?id={Clinic ID} endpoint, "Clinic Name", "Clinic Address", "Clinic City" and "Clinic Contact", Inject XSS Payload in "Clinic Name", "Clinic Address", "Clinic City" and "Clinic Contact".
    Capture1

issue2

  1. Click on "Register".
  2. Now Click on "Clinics Directory".

issue22

  1. After click on "Clinics Directory", you direct to /clinics/ endpoint where clinics directory show. Click on Clinic where XSS name show.

issue2_1

  1. XSS Executed on /clinics/profile.php?id={Clinic ID} endpoint.

issue2_22

@Saud-Ahmad
Copy link
Author

@Saud-Ahmad
Copy link
Author

Exploit has been Published by Exploit-DB
https://www.exploit-db.com/exploits/49795

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant