Headline
CVE-2022-1840: webray.com.cn/Home Clean Services Management System Stored Cross-Site Scripting(XSS).md at main · Xor-Gerke/webray.com.cn
A vulnerability, which was classified as problematic, has been found in Home Clean Services Management System 1.0. This issue affects register.php?link=registerand. The manipulation with the input <script>alert(1)</script> leads to cross site scripting. The attack may be initiated remotely but demands authentication. Exploit details have been disclosed to the public.
Home Clean Services Management System Stored Cross-Site Scripting(XSS)****Exploit Title: Home Clean Services Management System Stored Cross-Site Scripting(XSS)****Exploit Author: [email protected] inc****Vendor Homepage: https://www.sourcecodester.com/php/15293/home-clean-service-free-source-code.html****Software Link: https://www.sourcecodester.com/download-code?nid=15293&title=Home+Clean+Service+System+in+PHP+Free+Source+Code****Version: Home Clean Services Management System 1.0****Tested on: Windows Server 2008 R2 Enterprise, Apache ,Mysql****Description
Persistent XSS (or Stored XSS) attack is one of the three major categories of XSS attacks, the others being Non-Persistent (or Reflected) XSS and DOM-based XSS. In general, XSS attacks are based on the victim’s trust in a legitimate, but vulnerable, website or web application.Home Clean Services Management System does not filter the content correctly at the “register” module, resulting in the generation of stored XSS.
Payload used:
<script>alert(111)</script>
Proof of Concept
Login the CMS. Admin Default Access: Email: admin Password: admin
Open Page http://172.24.5.102/HCS/public_html/register.php?link=registerand click Edit button
Put XSS payload (<script>alert(111)</script>) in the content box and click on Register to publish the page
Viewing the successfully published page,Open Page http://172.24.5.102/HCS/public_html/admin/userlist.php,We can see the alert.