vendor:
Customer Support System
by:
Ahmed Abbas
7.5
CVSS
HIGH
Stored XSS
79
CWE
Product Name: Customer Support System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:customer_support_system:1.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 10 Pro 1909 (x64_86) + XAMPP 7.4.4
2020
Customer Support System 1.0 – ‘description’ Stored XSS in The Admin Panel
A stored XSS vulnerability exists in the Customer Support System 1.0 application. An attacker can exploit this vulnerability by navigating to http://TARGET/customer_support/index.php?page=department_list, clicking on new Department, and adding the XSS payload into the 'description' parameter value. Browsing to the post will trigger the XSS payload.
Mitigation:
Input validation should be used to prevent XSS attacks. All user-supplied input should be validated and filtered for malicious content.