header-logo
Suggest Exploit
vendor:
User Registration & Login and User Management System
by:
Ashutosh Singh Umath
7.5
CVSS
HIGH
Stored Cross-Site Scripting (XSS)
79
CWE
Product Name: User Registration & Login and User Management System
Affected Version From: 3
Affected Version To: 3
Patch Exists: NO
Related CWE: Requested
CPE: a:phpgurukul:user_registration_login_and_user_management_system:3.0
Metasploit:
Other Scripts:
Platforms Tested: Windows 11
2023

User Registration & Login and User Management System v3.0 – Stored Cross-Site Scripting (XSS)

User Registration & Login and User Management System With admin panel 3.0 application from PHPgurukul is vulnerable to Persistent XSS via the fname, lname, email, and contact field name. When User logs in or the admin user logs in the payload gets executed.

Mitigation:

Apply input validation and sanitization techniques to prevent the execution of malicious scripts. Also, consider implementing Content Security Policy (CSP) to restrict the types of content that can be executed.
Source

Exploit-DB raw data:

# Exploit Title: User Registration & Login and User Management System v3.0 - Stored Cross-Site Scripting (XSS)
# Google Dork: NA
# Date: 19/08/2023
# Exploit Author: Ashutosh Singh Umath
# Vendor Homepage: https://phpgurukul.com
# Software Link: https://phpgurukul.com/user-registration-login-and-user-management-system-with-admin-panel/
# Version: 3.0
# Tested on: Windows 11
# CVE : Requested


Description

User Registration & Login and User Management System With admin panel 3.0 application from PHPgurukul is vulnerable to
Persistent XSS via the fname, lname, email, and contact field name. When User logs in or the admin user logs in the payload gets executed.

POC

User side
1. Go to the user registration page http://localhost/loginsystem.
2. Enter <img src="x" onerror=alert(document.cookie)> in one of the
fields (first name, last name, email, or contact).
3. Click sign up.

Admin side
1. Login to admin panel http://localhost/loginsystem/admin.
2. After login successfully go to manage user page.
3. Payload


Thanks and Regards,

Ashutosh Singh Umath