vendor:
Patient Appointment Scheduler System
by:
a-rey
8,8
CVSS
HIGH
Persistent/Stored XSS
79
CWE
Product Name: Patient Appointment Scheduler System
Affected Version From: v1.0
Affected Version To: v1.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu 20.04.3 LTS (Focal Fossa) with XAMPP 8.0.10-0
2021
Patient Appointment Scheduler System 1.0 – Persistent/Stored XSS
Patient Appointment Scheduler System v1.0 is vulnerable to a persistent/stored XSS vulnerability. An attacker can inject malicious JavaScript code into the 'about_us' field of the SystemSettings.php page, which is then stored in the database and executed when the main page is loaded. This can be used to steal user cookies, redirect users to malicious websites, or perform other malicious activities.
Mitigation:
Input validation should be used to prevent malicious code from being stored in the database. Additionally, the application should be configured to use a Content Security Policy (CSP) to prevent the execution of malicious code.