[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Hostel Management System 2.1 - Cross Site Scripting (Multiple Fields) Vulnerabilities

Author
Kokn3t
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-35063
Category
web applications
Date add
19-10-2020
CVE
CVE-2020-25270
Platform
php
# Exploit Title: PHPGurukul hostel-management-system 2.1 allows XSS via
Guardian Name, Guardian Relation, Guardian Contact no, Address, City
# Exploit Author: Kokn3t
# Vendor Homepage: https://phpgurukul.com
# Software Link: https://phpgurukul.com/hostel-management-system
# Version:  V 2.1
# Tested on: Windows 10, Kali 2020.1
# CVE : CVE-2020-25270

######## Attack Vector ########

Install Hostel Management System V 2.1

1) User Module

    Login as user and go to "Book Hostel"
(http:/localhost/hostel/book-hostel.php) and start booking.

    Add malicious script in these fields - "<script>alert('XSS');</script>"

    i. Guardian Name

    ii. Guardian Relation

    iii.Guardian Contact no

    iv. Address

    vi. City

    After that will get a prompt "Student Successfully register" and after
pressing "See All", XSS will be triggered.

2) Admin Module

Login in as Admin and go to "Management Students", and "View Full details"
of booked student's record, XSS will be triggered also.

#  0day.today [2024-11-16]  #