exploit-db-mirror/exploits/php/webapps/49870.txt
Offensive Security 1b1c47b0a8 DB: 2021-05-18
11 changes to exploits/shellcodes

Microsoft Internet Explorer 8 - 'SetMouseCapture ' Use After Free

OpenEMR < 5.0.1 - (Authenticated) Remote Code Execution
OpenEMR 5.0.1.3 - Remote Code Execution (Authenticated)
Customer Relationship Management (CRM) System 1.0 - 'Category' Persistent Cross site Scripting
IPFire 2.25 - Remote Code Execution (Authenticated)
Dental Clinic Appointment Reservation System 1.0 - 'Firstname' Persistent Cross Site Scripting (Authenticated)
Dental Clinic Appointment Reservation System 1.0 - Cross Site Request Forgery (Add Admin)
Simple Chatbot Application 1.0 - 'Category' Stored Cross site Scripting
Billing Management System 2.0 - Union based SQL injection (Authenticated)
Advanced Guestbook 2.4.4 - 'Smilies' Persistent Cross-Site Scripting (XSS)
Subrion CMS 4.2.1 - File Upload Bypass to RCE (Authenticated)
Printable Staff ID Card Creator System 1.0 - SQLi & RCE via Arbitrary File Upload
2021-05-18 05:01:53 +00:00

23 lines
No EOL
1.2 KiB
Text
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Exploit Title: Dental Clinic Appointment Reservation System 1.0 - 'Firstname' Persistent Cross Site Scripting (Authenticated)
# Date: 14-05-2021
# Exploit Author: Reza Afsahi
# Vendor Homepage: https://www.sourcecodester.com/php/6848/appointment-reservation-system.html
# Software Link: https://www.sourcecodester.com/download-code?nid=6848&title=Dental+Clinic+Appointment+Reservation+System+in+PHP+with+Source+Code
# Version: 1.0
# Tested on: Linux parrot
# --- Description --- #
# The web application allows member to inject persistent Cross-Site-Scripting payload which will be executed in both member and Admin panel  
# --- Proof of concept --- #
1- Create account and login as member and go to:  http://localhost/APR/edit_info.php
2- Inject this payload into Firstname input : <script>alert(document.cookie)</script>
4- and fill other inputs as you want (Other inputs might be vulnerable as well) then click on Update button.
5- refresh the page and Xss popup will be triggered.
6- Now if Admin visit this page in his/her Dashboard : http://localhost/APR/admin/members.php
7- Our Xss payload will be executed on Admin Browser
** Attacker can use this vulnerability to take over Admin account **