Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stored XSS vulnerability in /patients/reports.php?id={Report ID} #8

Open
Saud-Ahmad opened this issue Mar 31, 2021 · 2 comments
Open

Comments

@Saud-Ahmad
Copy link

Stored XSS vulnerability in Version 2.0 which allows remote attacker to inject arbitrary script or html. This being stored, will impact all users who have permissions to view the vulnerable page.

Vulnerable Endpoint: http://localhost/RemoteClinic/patients/reports.php?id=85 (In my case, 85 is My Patient Report ID).

Steps to Reproduce:

  1. Login in Application as Doctor.
  2. Register New Patient.

1_edited

issue4_1

  1. After Register New Patient, a page redirect to Register Report Page, when you scroll down page two fields there "Fever" and "Blood Pressure" where i inject XSS Payload:
    Capture1

issue4_2

  1. Now go to home page.

issue4_3

  1. Click on Report which shows on dashboard "Fever...".

issue5_1

  1. XSS Executed on reports.php endpoint.

issue5_2

@Saud-Ahmad
Copy link
Author

@Saud-Ahmad
Copy link
Author

Exploit has been Published by Exploit-DB
https://www.exploit-db.com/exploits/49795

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant