header-logo
Suggest Exploit
vendor:
School Event Attendance Monitoring System
by:
Suresh Kumar
8.8
CVSS
HIGH
Stored Cross-Site Scripting
79
CWE
Product Name: School Event Attendance Monitoring System
Affected Version From: School Event Attendance Monitoring System 1.0
Affected Version To: School Event Attendance Monitoring System 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:school_event_attendance_monitoring_system:1.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 XAMPP
2021

School Event Attendance Monitoring System 1.0 – ‘Item Name’ Stored Cross-Site Scripting

This application is vulnerable to Stored XSS vulnerability. Whenever we will go to the page (http://localhost/attendance/sanction) where the script is injected, the stored script will be executed and the Javascript code (XSS) will be executed.

Mitigation:

Input validation and output encoding should be used to prevent XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title: School Event Attendance Monitoring System 1.0 - 'Item Name' Stored Cross-Site Scripting
# Date: 2021-02-11
# Exploit Author: Suresh Kumar
# Vendor Homepage: https://www.sourcecodester.com/
# Software Link: https://www.sourcecodester.com/php/12613/php-attendance-monitoring-system-barcode-scanning.html
# Software: School Event Attendance Monitoring System 1.0
# Tested on Windows 10 XAMPP

# This application is vulnerable to Stored XSS vulnerability.
# Vulnerable Page: http://localhost/attendance/sanction
# Vulnerable functionality: 'Add Sanction '
# Vulnerable Input Field : Item Name
# Payload used:

"><script>alert(document.cookie)</script>

# POC: Whenever we will go to the page (http://localhost/attendance/sanction)
where the script is injected, the stored script will be executed.
# You will see your Javascript code (XSS) executed.