Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-34652: Common-Vulnerabilities-and-Exposures/CVE-2023-34652 at main · ckalnarayan/Common-Vulnerabilities-and-Exposures

PHPgurukl Hostel Management System v.1.0 is vulnerable to Cross Site Scripting (XSS) via Add New Course.

CVE
#xss#vulnerability#java#php#auth

# Hostel Management System v.1.0 - Stored Cross-Site Scripting (XSS)Vulnerability

## Stored Cross Site Scripting Vulnerability found in Hostel Management System v.1.0

Vulnerability Description -

The Hostel Management System v.1.0, developed by PHPGurukul, is susceptible to a critical security vulnerability known as Stored Cross-Site Scripting (XSS). This vulnerability enables attackers to inject malicious JavaScript code, which is then stored and executed by the application.

Steps to Reproduce -

The following steps demonstrate how to exploit the Stored XSS vulnerability in the Hostel Management System v.1.0:

1. Visit the Hostel Management System v.1.0 application by accessing the URL: http://localhost/hostel/index.php.

2. Click on the “Admin” button to navigate to the admin login page.

3. Login to the Admin account using the default credentials.

- Username: admin

- Password: Test@123

4. Proceed to the Admin Profile page.

5. Click on Courses, and Add New Course, Within the “Course Code” "Course Name(Short)" "Course Name(Full)" field, inject the following XSS payload, enclosed in brackets: {"><script>alert(“XSS”)</script>}.

6. Click on the “Submit” button.

7. Refresh the page, and the injected payload will be executed.

As a result of successful exploitation, the injected JavaScript code will be stored in the application’s database. Subsequently, whenever another user accesses the affected page, the injected code will execute, triggering an alert displaying the text “XSS.” This allows the attacker to execute arbitrary code within the user’s browser, potentially leading to further attacks or unauthorized actions.

**Reference: CVE-2023-34652**

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda