Advertisement






Client Management System 1.1 - 'username' Stored Cross-Site Scripting (XSS)

CVE Category Price Severity
N/A CWE-79 N/A Medium
Author Risk Exploitation Type Date
Not specified Medium Remote 2021-06-17
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.039 0.721

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021060098

Below is a copy:

Client Management System 1.1 - 'username' Stored Cross-Site Scripting (XSS)
|===========================================================================
| # Exploit Title : Client Management System 1.1 - 'username' Stored Cross-Site Scripting (XSS)
|                                                                           
| # Author : Ali Seddigh                                               
|                                                                           
| # Category : Web Application               
|
| # Vendor Homepage : https://phpgurukul.com
|
| # Software Link : https://phpgurukul.com/client-management-system-using-php-mysql/
|                                                                           
| # Tested on : [ Windows ~> 10 , KaliLinux ]                                                     
|
| # Version : 1.1
|                  
| # Date : 2021-06-16                                                        
|===========================================================================

<----- Description ----->

Client Management System 1.1 is vulnerable to stored cross site scripting because of insufficient user supplied data sanitization. 

# Proof of Concept (PoC) : 

1) Goto: http://localhost/clientms/admin/index.php
2) Login as admin using test credentials: admin/Test@123
3) Goto: http://localhost/clientms/admin/admin-profile.php
4) Enter the following payload in the user name field: <script>alert(1)</script>
5) Click on Update
6) Our payload is fired and stored

|===========================================================================
| # Discovered By : Ali Triplex                                             
|===========================================================================

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum