vendor:
COVID19 Testing Management System
by:
Rohit Burke
8.8
CVSS
HIGH
Stored Cross-Site Scripting (XSS)
79
CWE
Product Name: COVID19 Testing Management System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:phpgurukul:covid19_testing_management_system
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 10
2021
COVID19 Testing Management System 1.0 – ‘Admin name’ Cross-Site Scripting (XSS)
An attacker uses Stored XSS to inject malicious content (referred to as the payload), most often JavaScript code, into the target application. If there is no input validation, this malicious code is permanently stored (persisted) by the target application, for example within a database. When a victim opens the affected web page in a browser, the XSS attack payload is served to the victim’s browser as part of the HTML code (just like a legitimate comment would). This means that victims will end up executing the malicious script once the page is viewed in their browser.
Mitigation:
Input validation should be done to prevent XSS attacks.