Headline
CVE-2022-2020: vul/Prison Management System(XSS).md at main · ch0ing/vul
A vulnerability, which was classified as problematic, has been found in SourceCodester Prison Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/?page=system_info of the component System Name Handler. The manipulation with the input <img src="" onerror="alert(1)"> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Prison Management System - system_info ‘name’ Stored Cross-Site Scripting(XSS)****Exploit Title: Prison Management System - system_info ‘name’ Stored Cross-Site Scripting(XSS)****Exploit Author: [email protected] inc****Vendor Homepage: https://www.sourcecodester.com/php/15368/prison-management-system-phpoop-free-source-code.html****Software Link:https://www.sourcecodester.com/download-code?nid=15368&title=Prison+Management+System+in+PHP%2FOOP+Free+Source+Code****Version: Prison Management System 1.0****Tested on: Windows Server 2008 R2 Enterprise, Apache ,Mysql****Description
Persistent XSS (or Stored XSS) attack is one of the three major categories of XSS attacks, the others being Non-Persistent (or Reflected) XSS and DOM-based XSS. In general, XSS attacks are based on the victim’s trust in a legitimate, but vulnerable, website or web application.Prison Management System does not filter the content correctly at the “name” parameter, resulting in the generation of stored XSS.
Payload used:
<img src="" onerror="alert(111111111)">
Proof of Concept
Login the CMS. Admin Default Access: username: admin Password: admin123
Open Page http://192.168.67.5/pms/admin/?page=system_info
Put XSS payload in the content box and click on Update to publish the page ;
We can see the alert.;