header-logo
Suggest Exploit
vendor:
School File Management System
by:
Pintu Solanki
8.8
CVSS
HIGH
Stored Cross-Site Scripting
79
CWE
Product Name: School File Management System
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:sourcecodester:school_file_management_system:1.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 Pro 10.0.18363 N/A Build 18363 + XAMPP V3.2.4
2021

School File Management System 1.0 – ‘multiple’ Stored Cross-Site Scripting

School File Management System 1.0 is vulnerable to stored cross-site scripting. An attacker can inject malicious JavaScript code into the 'Firstname' and 'Lastname' fields of the 'Update Account' page. When a user visits the page, the malicious code will be executed, allowing the attacker to access the user's cookies.

Mitigation:

Input validation should be used to prevent malicious code from being injected into the application.
Source

Exploit-DB raw data:

# Exploit Title: School File Management System 1.0 - 'multiple' Stored Cross-Site Scripting
# Date: 2021-02-11
# Exploit Author: Pintu Solanki
# Vendor Homepage: https://www.sourcecodester.com/
# Software Link: https://www.sourcecodester.com/php/14155/school-file-management-system.html
# Software: : School File Management System 1.0
# Tested On: Windows 10 Pro 10.0.18363 N/A Build 18363 + XAMPP V3.2.4


# Vulnerable Page: http://localhost/School%20File%20Management%20System/student_profile.php
# Vulnerable functionality: 'Update Account'
# Vulnerable Input Field : {Firtstname} {Lastname}
# Payload used:

"><script>alert(document.cookie)</script>

# POC: Whenever we will go to the page (http://localhost/School%20File%20Management%20System/student_profile.php) where the script is injected, the stored script will be executed.
# You will see your Javascript code (XSS) executed.