Submit #306957: PHPGurukul Emergency Ambulance Hiring Portal 1.0 Cross Site Scriptinginfo

TitlePHPGurukul Emergency Ambulance Hiring Portal 1.0 Cross Site Scripting
DescriptionBug Description: An unauthenticated stored cross-site scripting (XSS) vulnerability in PHPGurukul Emergency Ambulance Hiring Portal 1.0 allows attackers to execute arbitrary web scripts via a crafted payload injected in the "Hire an Ambulance" functionality. Steps to Reproduce: # Exploit Title: Stored XSS in "Hire an Ambulance" functionality of Emergency Ambulance Hiring Portal # Date: 28-03-2024 # Exploit Author: dhabaleshwardas # Vendor Homepage: https://phpgurukul.com/ # Software Link: https://phpgurukul.com/emergency-ambulance-hiring-portal-using-php-and-mysql/ # Version: 1.0 # Tested on: firefox/chrome/brave # CVE: To reproduce the attack: 1- Head to the http://localhost/eahp/index.php endpoint . Then click on "Hire an Ambulance". 2- Here you would be asked to fill all the fields. We simply put XSS payloads in all the fields and clicked "Submit". 3- Login to the Admin account and you'll see a new request notification on the top left corner, click on it, and all the payloads would be executed showing pop-ups after pop-ups. 4- We can see that the payloads are directly embedded into the HTML content without proper sanitization or encoding, and hence, pop-ups are shown.
Source⚠️ https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_sxss.md
Userdhabaleshwar (ID 58737)
Submission03/29/2024 11:57 (1 month ago)
Moderation03/29/2024 15:27 (3 hours later)
Accepted
Accepted
VulDB EntryVDB-258677

Do you know our Splunk app?

Download it now for free!