
8 changes to exploits/shellcodes Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS) Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS) Hospitals Patient Records Management System 1.0 - 'doctors' Stored Cross Site Scripting (XSS) SalonERP 3.0.1 - 'sql' SQL Injection (Authenticated) Online Diagnostic Lab Management System 1.0 - Account Takeover (Unauthenticated) Online Diagnostic Lab Management System 1.0 - Stored Cross Site Scripting (XSS) Online Diagnostic Lab Management System 1.0 - SQL Injection (Unauthenticated) WordPress Core 5.8.2 - 'WP_Query' SQL Injection
23 lines
No EOL
1 KiB
Text
23 lines
No EOL
1 KiB
Text
#Exploit Title: Online Diagnostic Lab Management System 1.0 - Stored Cross Site Scripting (XSS)
|
|
#Date: 11/01/2022
|
|
#Exploit Author: Himash
|
|
#Vendor Homepage: https://www.sourcecodester.com/php/15129/online-diagnostic-lab-management-system-php-free-source-code.html
|
|
#Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/odlms.zip
|
|
#Version: 1.0
|
|
#Tested on: Kali Linux
|
|
|
|
Online Diagnostic Lab Management System 1.0 is vulnerable to stored cross-site-scripting.
|
|
Stored cross-site scripting (persistent XSS) arises when an application receives its data from
|
|
an untrusted source and includes that data within its responses in an unsafe way.
|
|
|
|
#Steps to Reproduce
|
|
|
|
1. Login to the admin account with username 'admin' and password 'admin123'
|
|
|
|
2. Navigate to the 'User List' option
|
|
|
|
3. Create new user by adding following payload in
|
|
First Name and Last Name fields.
|
|
<image src/onerror=prompt(document.cookie)>
|
|
|
|
4. XSS payload will be triggered in the page http://localhost/odlms/admin/?page=user/list |