FirstBlood-#1577Stored XSS on about.php through doctor of the profile photo
This issue was discovered on FirstBlood v3

On 2022-12-11, 0xblackbird Level 5 reported:


Hi mate!

I hope you're doing well today!

I found another stored XSS vulnerability on /about.php passed on from /drpanel/drapi/edit-dr.php. The doctor of the month's photoUrl parameter is reflected in the src attribute without being filtered or escaped correctly on /about.php.

Possible cause:

The developers thought that there was no way to change the profile photo URL of the doctor of the month but forgot that invoking the API directly is still possible.


I was able to execute javascript code on any doctor's behalf. Even more, I was also able to steal the sensitive session cookie as it is not an HTTPOnly cookie. This allowed me to successfully take over the account of the doctor.

Steps to reproduce:

1) Login using the default credentials: admin:admin:

2) Next, replicate the following request:

POST /drpanel/drapi/edit-dr.php HTTP/1.1
Host: {HOST}
Cookie: drps={SESS_COOKIE}
Content-Type: application/x-www-form-urlencoded

3) Finally, visit /about.php. A popup should be displayed with the document's domain:

We can elevate our privileges by easily taking over the doctor's account as cookies are not set to be HTTPOnly. To do so, we could put the following payload in the phone parameter to steal and send the cookies back to us:


Next, visit the endpoint again: /about.php

Upon visiting the URL (as the victim), we can see a hit with the cookies on our server:


I highly recommend encoding any user input and validating it before reflecting it in the response.

Kind regards,


P2 High

Endpoint: /drpanel/drapi/edit-dr.php

Parameter: drid=3&photoUrl

Payload: /x'"+onerror="alert(document.domain)"

FirstBlood ID: 65
Vulnerability Type: Stored XSS

There is a stored XSS vulnerability on about.php via the photo of doctor ID 3