Bayanno Hospital Management System v4.2 Stored XSS Injection - CXSecurity.com

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1579929 漏洞类型
发布时间 2019-04-23 更新时间 2019-04-23
CVE编号 N/A CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2019040205
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
[*] :: Title: Bayanno Hospital Management System v4.2 Stored XSS Injection
[*] :: Author: QUIXSS
[*] :: Date: 2019-04-23
[*] :: Software: Bayanno Hospital Management System v4.2
  
[?] :: Technical Details & Description:
# Weak security measures like no input fields data filtering has been discovered in the «Bayanno Hospital Management System». Current version of this web-application is 4.2.

[?] :: Demo Website:
# https://codecanyon.net/item/bayanno-hospital-management-system/5814621
# Frontend: http://creativeitem.com/demo/bayanno/
# Backend: http://creativeitem.com/demo/bayanno/index.php/login
# Login: admin@example.com, Password: 1234

[!] :: PoC Payload:
# "><script>alert('QUIXSS')</script>
# http://creativeitem.com/demo/bayanno/index.php/admin/dashboard

[+] :: PoC [Stored XSS Injection]:
# Authorize on the demo website for tests: http://creativeitem.com/demo/bayanno/index.php/login (login / password is admin@example.com / 1234). Then go to the settings page: http://creativeitem.com/demo/bayanno/index.php/admin/system_settings and save your payload in the «System Name» and/or «System Title» input fields.
# Almost each input field is vulnerable for Stored XSS Injection.