header-logo
Suggest Exploit
vendor:
Client Management System
by:
BHAVESH KAUL
8,8
CVSS
HIGH
Stored Cross-Site Scripting (XSS)
79
CWE
Product Name: Client Management System
Affected Version From: 1.1
Affected Version To: 1.1
Patch Exists: NO
Related CWE: N/A
CPE: a:phpgurukul:client_management_system:1.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Server: XAMPP
2021

Client Management System 1.1 – ‘username’ Stored Cross-Site Scripting (XSS)

Client Management System 1.1 is vulnerable to stored cross site scripting because of insufficient user supplied data sanitization. To exploit this vulnerability, an attacker can enter a malicious payload in the user name field and click on Update. The payload will be stored in the database.

Mitigation:

Input validation should be used to ensure that user supplied data is properly sanitized before being stored in the database.
Source

Exploit-DB raw data:

# Exploit Title: Client Management System 1.1 - 'username' Stored Cross-Site Scripting (XSS)
# Date: 14 June 2021
# Exploit Author: BHAVESH KAUL
# Vendor Homepage: https://phpgurukul.com
# Software Link: https://phpgurukul.com/client-management-system-using-php-mysql/
# Version: 1.1
# Tested on: Server: XAMPP

# Description #

Client Management System 1.1 is vulnerable to stored cross site scripting because of insufficient user supplied data sanitization. 

# Proof of Concept (PoC) : Exploit #

1) Goto: http://localhost/clientms/admin/index.php
2) Login as admin using test credentials: admin/Test@123
3) Goto: http://localhost/clientms/admin/admin-profile.php
4) Enter the following payload in the user name field: <script>alert(1)</script>
5) Click on Update
6) Our payload is fired and stored