| タイトル | SourceCodester Patients Waiting Area Queue Management System 1.0 Cross Site Scripting |
|---|
| 説明 | A Stored Cross-Site Scripting (XSS) vulnerability was discovered in SourceCodester Patients Waiting Area Queue Management System 1.0. The vulnerability is located in the 'Find Patient' module (/pqms/patient-search.php).
The flaw occurs because the application fails to sanitize patient registration data (specifically the First Name and Last Name fields) before storing it in the database and subsequently rendering it in the search results. A remote attacker can register a patient with a malicious payload, such as "><img src=x onerror=alert(1)>. When an authenticated staff member or administrator searches for patients at /pqms/patient-search.php, the payload is retrieved from the database and executed in their browser context. This could lead to session hijacking, unauthorized data access, or administrative account takeover. |
|---|
| ソース | ⚠️ https://gist.github.com/archana1122m/e2953222b47c29c8c69855f5d623267d |
|---|
| ユーザー | Archana M (UID 95668) |
|---|
| 送信 | 2026年02月17日 21:25 (2 月 ago) |
|---|
| モデレーション | 2026年02月24日 23:01 (7 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 347677 [SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0 /patient-search.php First Name/Last Name クロスサイトスクリプティング] |
|---|
| ポイント | 20 |
|---|