Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-38149 PoC — Chikitsa Patient Management System 跨站脚本漏洞

Source
Associated Vulnerability
Title:Chikitsa Patient Management System 跨站脚本漏洞 (CVE-2021-38149)
Description:Chikitsa Patient Management System是一个应用软件。一款开源患者管理软件, 它快速、响应迅速且易于使用。 Chikitsa Patient Management System 2.0.0存在安全漏洞,该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Description
Chikitsa Patient Management System Stored Cross-Site Scripting (XSS)
Readme
# CVE-2021-38149
Chikitsa Patient Management System 2.0.0 Stored Cross-Site Scripting (XSS)

An instance of stored cross-site scripting (XSS) exists in multiple pages on version 2.0.0 of Chikitsa Patient Management System that allows for arbitrary JavaScript to be executed in a user's browswer that could potentially allow for a user to escalate privileges.

Vulnerable Pages:
- /index.php/admin/add_user
- /index.php/appointment/todos
- /index.php/appointment/insert_patient_add_appointment/(hr of apppointment)/(minute of appointment)/<date>/Appointments//0/
  
Known Cross-Site Scripting Payloads That Work:
  - ```<script>alert('xss');</script>```
  - ```<img src=x onerror=alert(document.domain)>```

<h2>Proof of Concept:</h2>

![image](https://user-images.githubusercontent.com/67240643/128488299-3d9747b9-1664-4666-a76f-f7e47e049dce.png)
<i>A user with privileges to create other users has the ability to create users can input a XSS payload into any of the user's name fields shown above.</i>
  
![image](https://user-images.githubusercontent.com/67240643/128488944-04f3d355-8f0d-4f58-84d7-c50f68a47b76.png)
  <i>Observing the application's response reveals that the JavaScript is being reflected.</i>
  
![image](https://user-images.githubusercontent.com/67240643/128489227-1f2021c6-7716-4526-a912-55d987343444.png)
<i>The created user containing the malicious XSS payload has successfully been created and will execute the JavaScript everytime a user visits the users the application contains.</i>

Discovered By: Joe Aguilar Jr.
File Snapshot

[4.0K] /data/pocs/2369e029bc22dc6233e2bc8a8c17997afad5bbd0 └── [1.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.