提出 #306964: PHPGurukul Emergency Ambulance Hiring Portal 1.0 Cross Site Scripting情報

タイトルPHPGurukul Emergency Ambulance Hiring Portal 1.0 Cross Site Scripting
説明Bug Description: A stored cross-site scripting (XSS) vulnerability in PHPGurukul Emergency Ambulance Hiring Portal 1.0 allows attackers to execute arbitrary web scripts via a crafted payload injected in the "Add Ambulance" functionality. Steps to Reproduce: # Exploit Title: Stored XSS in "Add Ambulance" functionality of Emergency Ambulance Hiring Portal # Date: 28-03-2024 # Exploit Author: dhabaleshwardas # Vendor Homepage: https://phpgurukul.com/ # Software Link: https://phpgurukul.com/emergency-ambulance-hiring-portal-using-php-and-mysql/ # Version: 1.0 # Tested on: firefox/chrome/brave # CVE: To reproduce the attack: 1- First, login to the application then, head to the http://localhost/eahp/admin/add-ambulance.php endpoint . 2- Here you would be asked to fill all the fields. We simply put XSS payloads in "Ambulance Reg No." and "Driver Name" fields and clicked "Add". 3- We can see that the payloads are directly embedded into the HTML content without proper sanitization or encoding, and hence, pop-ups are shown.
ソース⚠️ https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_authsxss.md
ユーザー
 dhabaleshwar (UID 58737)
送信2024年03月29日 12:06 (2 年 ago)
モデレーション2024年03月29日 15:27 (3 hours later)
ステータス承諾済み
VulDBエントリ258683 [PHPGurukul Emergency Ambulance Hiring Portal 1.0 Add Ambulance Page /admin/add-ambulance.php Ambulance Reg No/Driver Name クロスサイトスクリプティング]
ポイント20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!