| 标题 | SourceCodester Patients Waiting Area Queue Management System 1.0 Cross Site Scripting |
|---|
| 描述 | A Stored Cross-Site Scripting (XSS) vulnerability was discovered in SourceCodester Patients Waiting Area Queue Management System 1.0. This vulnerability specifically impacts the public-facing queue monitor located at /pqms/queue.php.
The flaw exists because the application retrieves unsanitized patient names from the database and renders them directly onto the public queue board. An attacker can register a patient with a malicious JavaScript payload (e.g., "><img src=x onerror=alert(1)>). Because the queue.php page is designed to refresh and display entries automatically, the script executes in the browser of anyone viewing the public monitor. This represents a critical security risk as it allows for persistent script execution on public-facing kiosks and can be used to deface the display or capture administrative sessions if viewed by authorized staff. |
|---|
| 来源 | ⚠️ https://gist.github.com/archana1122m/2aed32e2a7ca5a648105bfdffd72a955 |
|---|
| 用户 | Archana M (UID 95668) |
|---|
| 提交 | 2026-02-18 09時40分 (2 月前) |
|---|
| 管理 | 2026-02-24 23時02分 (7 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 347678 [SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0 /queue.php firstname/lastname 跨网站脚本] |
|---|
| 积分 | 20 |
|---|