Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-25270 PoC — PHPGurukul Hostel Management System 跨站脚本漏洞

Source
Associated Vulnerability
Title:PHPGurukul Hostel Management System 跨站脚本漏洞 (CVE-2020-25270)
Description:PHPGurukul Hostel Management System是一套旅馆管理系统。 PHPGurukul Hostel Management System 2.1版本存在跨站脚本漏洞,该漏洞源于通过监护人的名字,监护人关系,监护人联系不,地址,或城市进行跨站服务。
Description
PHPGurukul hostel-management-system 2.1 allows XSS via  Guardian Name, Guardian Relation,  Guardian Contact no,  Address, City
Readme
# CVE-2020-25270
PHPGurukul hostel-management-system 2.1 allows XSS via  Guardian Name, Guardian Relation,  Guardian Contact no,  Address, City

#Vendor - PHPGurukul

#Product -https://phpgurukul.com/hostel-management-system V2.1

#Vulnerability Type - Cross Site Scripting (XSS)

#Addition Information - XSS will be triggered in both side, user can escalate of admin privilege through stealing admin cookies.

#Affected Component - Books > New Book ,[ http:///lms/index.php?page=books] http:///lms/index.php?page=books

#Attack Type- Local

#Privilege Escalation - true

#Impact Code execution - true

> Attack Vector
> --------------
>
>  Install Hostel Management System V 2.1
>
>
> ***1) User Module***
> ------------------
>
> Login as user and go to "Book Hostel" (http:/localhost/hostel/book-hostel.php) and start booking.

>
> Add malicious script in these fields - "<script>alert('XSS');</script>"
> 
>  i.  Guardian Name

>  ii. Guardian Relation

>  iii.Guardian Contact no

>  iv. Address

>  vi. City

> 
> After that will get a prompt "Student Successfully register" and after pressing "See All", XSS will be triggered.




> 
> ***2) Admin Module***
> ------------------
>
> Login in as Admin and go to "Management Students", and "View Full details" of booked student's record, XSS will be triggered also.
File Snapshot

[4.0K] /data/pocs/b19f8a4b4d74dd7c6bf2a5df480b5ac9c05fe326 └── [1.3K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.