# Patrick Mvuma 乘客等候队列管理系统的跨站脚本漏洞
## 概述
SourceCodester/Patrick Mvuma开发的患者候诊区队列管理系统1.0版本中存在跨站脚本(XSS)漏洞。该漏洞存在于`/php/api_patient_schedule.php`文件中,通过操纵参数`Reason`可触发XSS攻击,攻击者可远程发起攻击,且已有公开的利用方式。
## 影响版本
1.0
## 细节
漏洞位于`/php/api_patient_schedule.php`文件,当用户输入的`Reason`参数未经过充分过滤或转义时,恶意脚本代码会被注入并执行,从而导致跨站脚本攻击。
## 影响
攻击者可远程利用该漏洞注入恶意脚本,实现对用户浏览器的劫持,窃取会话信息或执行恶意操作。由于漏洞利用方式已公开,存在较高的被利用风险。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: Login required -- 🔗来源链接
标签:signaturepermissions-required
神龙速读:
- **漏洞编号**: VDB-341740, CVE-2026-1147, GCVE-100-341740
- **受影响系统**: Sourcecodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0
- **漏洞类型**: API_patient_schedule.php Reason Cross Site Scripting (XSS)
- **访问限制**: 需要登录才能查看详细信息和下载相关内容
标题: Submit #735544: Patrick Mvuma Patients Waiting Area Queue Management System 1.0 Cross Site Scripting -- 🔗来源链接
标签:third-party-advisory
神龙速读:
### Key Information on Vulnerability from Screenshot
- **Vulnerability ID:** 735544
- **Title:** Patrick Mvuma Patients Waiting Area Queue Management System 1.0 Cross Site Scripting
- **Description:**
- Type: Stored Cross-Site Scripting via Appointment Reason Field
- The endpoint `pqms/php/api_patient_schedule.php` stores reasons for appointments and later displays them on `dashboard.php` without proper encoding, leading to Stored XSS.
- **Proof of Concept:**
- `<script>alert('XSS')</script>`
- **Reporter:**
- User: bobsux (UID 94358)
- **Submission & Moderation:**
- Submission Date: 01/09/2026 at 08:11 PM
- Moderation Date: 01/18/2026 at 02:50 PM
- **Status:** Accepted
- **VulDB Entry:** 341740
- Related to SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0 `api_patient_schedule.php` Reason cross site scripting
- **Points:** 17
暂无评论