| 제목 | PHPGurukul Emergency Ambulance Hiring Portal 1.0 Cross Site Scripting |
|---|
| 설명 | Bug Description:
An unauthenticated stored cross-site scripting (XSS) vulnerability in PHPGurukul Emergency Ambulance Hiring Portal 1.0 allows attackers to execute arbitrary web scripts via a crafted payload injected in the "Hire an Ambulance" functionality.
Steps to Reproduce:
# Exploit Title: Stored XSS in "Hire an Ambulance" functionality of Emergency Ambulance Hiring Portal
# Date: 28-03-2024
# Exploit Author: dhabaleshwardas
# Vendor Homepage: https://phpgurukul.com/
# Software Link: https://phpgurukul.com/emergency-ambulance-hiring-portal-using-php-and-mysql/
# Version: 1.0
# Tested on: firefox/chrome/brave
# CVE:
To reproduce the attack:
1- Head to the http://localhost/eahp/index.php endpoint . Then click on "Hire an Ambulance".
2- Here you would be asked to fill all the fields. We simply put XSS payloads in all the fields and clicked "Submit".
3- Login to the Admin account and you'll see a new request notification on the top left corner, click on it, and all the payloads would be executed showing pop-ups after pop-ups.
4- We can see that the payloads are directly embedded into the HTML content without proper sanitization or encoding, and hence, pop-ups are shown. |
|---|
| 원천 | ⚠️ https://github.com/dhabaleshwar/Open-Source-Vulnerabilities/blob/main/eahp_sxss.md |
|---|
| 사용자 | dhabaleshwar (UID 58737) |
|---|
| 제출 | 2024. 03. 29. AM 11:57 (2 연령 ago) |
|---|
| 모더레이션 | 2024. 03. 29. PM 03:27 (3 hours later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 258677 [PHPGurukul Emergency Ambulance Hiring Portal 1.0 Hire an Ambulance Page 크로스 사이트 스크립팅] |
|---|
| 포인트들 | 20 |
|---|