提交 #760189: SourceCodester Patients Waiting Area Queue Management System 1.0 Cross Site Scripting信息

标题SourceCodester Patients Waiting Area Queue Management System 1.0 Cross Site Scripting
描述A Stored Cross-Site Scripting (XSS) vulnerability was discovered in SourceCodester Patients Waiting Area Queue Management System 1.0. This vulnerability specifically impacts the public-facing queue monitor located at /pqms/queue.php. The flaw exists because the application retrieves unsanitized patient names from the database and renders them directly onto the public queue board. An attacker can register a patient with a malicious JavaScript payload (e.g., "><img src=x onerror=alert(1)>). Because the queue.php page is designed to refresh and display entries automatically, the script executes in the browser of anyone viewing the public monitor. This represents a critical security risk as it allows for persistent script execution on public-facing kiosks and can be used to deface the display or capture administrative sessions if viewed by authorized staff.
来源⚠️ https://gist.github.com/archana1122m/2aed32e2a7ca5a648105bfdffd72a955
用户
 Archana M (UID 95668)
提交2026-02-18 09時40分 (2 月前)
管理2026-02-24 23時02分 (7 days later)
状态已接受
VulDB条目347678 [SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0 /queue.php firstname/lastname 跨网站脚本]
积分20

Interested in the pricing of exploits?

See the underground prices here!