Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-25271 PoC — PHP 跨站脚本漏洞

Source
Associated Vulnerability
Title:PHP 跨站脚本漏洞 (CVE-2020-25271)
Description:PHP(PHP:Hypertext Preprocessor,PHP:超文本预处理器)是PHPGroup和开放源代码社区的共同维护的一种开源的通用计算机脚本语言。该语言主要用于Web开发,支持多种数据库及操作系统。 PHPGurukul hospital-management-system-in-php 4.0版本存在跨站脚本漏洞,该漏洞源于admin/patient-search.php, doctor/search.php, book-appointment.php, doctor/appointme
Readme
# CVE-2020-25271

# PHPGurukul hospital-management-system-in-php 4.0 allows XSS via
> admin/patient-search.php,

> doctor/search.php,

> book-appointment.php,

> doctor/appointment-history.php, or

> admin/appointment-history.php.


#Vendor - PHPGurukul

#Product -https://phpgurukul.com/hospital-management-system-in-php  V 4.0

#Vulnerability Type - Cross Site Scripting (XSS)

#Addition Information - Single XSS payload will trigger in all Dashboard, so account take over will be occurred.

#Affected Component - Books > New Book ,[ http:///lms/index.php?page=books] http:///lms/index.php?page=books

#Attack Type- Local

#Privilege Escalation - true

#Impact Code execution - true

> ***Attack Vector***
> --------------------
>
>
> Cross site scripting in  Admin | View Patients (http://localhost/hospital/hms/admin/patient-search.php)
>
>
> Stored XSS in User | Dashboard ( Name field)
>
>
> Cross site scripting in  Doctor | Manage Patients (http://localhost/hospital/hms/doctor/search.php)
>
>
> Install Hospital Management System V 4.0
>
>
>***1) Patient Module***
> ________________
>
>  i.  Create patient account account with username "<script>alert(`XSS`);</script>" , XSS will be triggered in every page of Patient Dashboard
> 
>  ii. Make an appointment  at "Book Appointment" (http://localhost/hospital/hms/book-appointment.php).
>
>
>
> ***2) Doctor Module***
> ________________
>
>  i. Login as doctor who was requested appointment by malicious patient
> 
>  ii. Go to "Appointment History" (http://localhost/hospital/hms/doctor/appointment-history.php), XSS will trigger also.
> 
> 
>
> ***3) Admin Module***
>
>  i.  Login as admin
>  ii. Go to "Appointment History" (http://localhost/hospital/hms/admin/appointment-history.php), XSS will trigger.
File Snapshot

[4.0K] /data/pocs/b70a37d2292af6215468d78a09296f0e2d51e9f4 └── [1.7K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.