header-logo
Suggest Exploit
vendor:
Hospitals Patient Records Management System
by:
Sant268
8.8
CVSS
HIGH
Stored Cross Site Scripting (XSS)
79
CWE
Product Name: Hospitals Patient Records Management System
Affected Version From: HPRMS 1.0
Affected Version To: HPRMS 1.0
Patch Exists: NO
Related CWE:
CPE: a:sourcecodester:hospitals_patient_records_management_system:1.0
Metasploit:
Other Scripts:
Platforms Tested: Ubuntu 20, Apache
2020

Hospitals Patient Records Management System 1.0 – ‘room_types’ Stored Cross Site Scripting (XSS)

A XSS issue in HPRMS v.1.0 allows remote attackers to inject JavaScript via /articles in the description parameter.

Mitigation:

Input validation and output encoding should be used to prevent XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title: Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS)
# Exploit Author: (Sant268)
# Vendor Homepage: https://www.sourcecodester.com/
# Software Link: https://www.sourcecodester.com/php/15116/hospitals-patient-records-management-system-php-free-source-code.html
# Version: HPRMS 1.0
# Tested on: Ubuntu 20, Apache

- Description:
A XSS issue in HPRMS v.1.0 allows remote attackers to inject JavaScript via /articles in the description parameter.

- Payload used:
<img src =q onerror=prompt(8)>

- Steps to reproduce:
1- Go to http://victim.com/admin/?page=room_types
2- Add Room type, paste the payload in description
3- Alert will pop whenever the page is accessed.