| 标题 | SourceCodester Patients Waiting Area Queue Management System 1.0 Cross Site Scripting |
|---|
| 描述 | A Stored Cross-Site Scripting (XSS) vulnerability was discovered in SourceCodester Patients Waiting Area Queue Management System 1.0. The vulnerability is located in the 'Find Patient' module (/pqms/patient-search.php).
The flaw occurs because the application fails to sanitize patient registration data (specifically the First Name and Last Name fields) before storing it in the database and subsequently rendering it in the search results. A remote attacker can register a patient with a malicious payload, such as "><img src=x onerror=alert(1)>. When an authenticated staff member or administrator searches for patients at /pqms/patient-search.php, the payload is retrieved from the database and executed in their browser context. This could lead to session hijacking, unauthorized data access, or administrative account takeover. |
|---|
| 来源 | ⚠️ https://gist.github.com/archana1122m/e2953222b47c29c8c69855f5d623267d |
|---|
| 用户 | Archana M (UID 95668) |
|---|
| 提交 | 2026-02-17 21時25分 (2 月前) |
|---|
| 管理 | 2026-02-24 23時01分 (7 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 347677 [SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0 /patient-search.php First Name/Last Name 跨网站脚本] |
|---|
| 积分 | 20 |
|---|