Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-34224 PoC — Computer Laboratory Management System 安全漏洞

Source
Associated Vulnerability
Title:Computer Laboratory Management System 安全漏洞 (CVE-2024-34224)
Description:Computer Laboratory Management System是一个计算机实验室管理系统。 Sourcecodester Computer Laboratory Management System 1.0版本存在安全漏洞,该漏洞源于存在跨站脚本漏洞,允许远程攻击者注入任意Web脚本或HTML。
Description
CVE-2024-34224 | Cross Site Scripting
Readme
# Computer Laboratory Management System using PHP and MySQL 1.0
#### Submitter: Kha Do

## Vulnerability
Cross Site Scripting

## Description
Cross Site Scripting vulnerability in /php-lms/classes/Users.php?f=save in Computer Laboratory Management System using PHP and MySQL 1.0 allow remote attackers to inject arbitrary web script or HTML via the firstname, middlename, lastname parameters.

## Affected component
Path URL: /php-lms/classes/Users.php?f=save

Parameters: **firstname, middlename, lastname**

## POC

Input payload `<script>alert(123)</script>` into firstname **parameter** and save it.
![Firstname](https://github.com/dovankha/CVE-2024-34224/assets/63991630/17934b7c-bb6a-4ced-b9b2-d10ff4a39e74)

After saving, the pop-up windows like will appear:
![Firstname_Popup](https://github.com/dovankha/CVE-2024-34224/assets/63991630/d6bb4232-aa8a-4bf8-a7cd-158507de4dbf)
File Snapshot

[4.0K] /data/pocs/f02330c5d6368075e62f9c6ba2768c75a56640b1 └── [ 882] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.