FirstBlood-#16783 stored XSS in meet drs.php
This issue was discovered on FirstBlood v3



On 2022-12-13, twsec Level 2 reported:

Hi Sean, i found 3 stored XSS in meet_drs.php in the fields : name, tagline, and bio.

steps to reproduce:

1- in /api/managedoctors.php modify the data you want and in the fields: name, tagline,and bio insert some javascript

add the payload as seen in the image.

Notice that such code didn't execute in edit-doctor.php

2- goto /meet_drs.php and you'll see 3 consecutive xss execute.

check the source of the page with developer tools

and you'll see the 3 stored XSS.

P2 High

This report contains multiple vulnerabilities:

  • Access control
  • Stored XSS
  • Stored XSS
  • Stored XSS


FirstBlood ID: 75
Vulnerability Type: Access_control

An unauthenticated user can modify doctors via a PUT request on the /api/managedoctors.php endpoint

FirstBlood ID: 70
Vulnerability Type: Stored XSS

Doctors can have taglines set however the tagline is vulnerable to stored XSS on meet_drs.php

FirstBlood ID: 74
Vulnerability Type: Stored XSS

It is possible to achieve stored XSS via the doctors bio on about.php (doctor ID 3) and meet_drs.php (only doctor ID 1 and 2 are affected)

FirstBlood ID: 54
Vulnerability Type: Stored XSS

It is possible to achieve stored XSS on the /meet_drs.php endpoint via a malicious doctors name