Security
Headlines
HeadlinesLatestCVEs

Headline

User Registration And Login And User Management System 3.0 Cross Site Scripting

User Registration and Login and User Management System version 3.0 suffers from a persistent cross site scripting vulnerability.

Packet Storm
#xss#vulnerability#windows#google#php#auth
# Exploit Title: User Registration & Login and User Management System v3.0 - Stored Cross-Site Scripting (XSS)# Google Dork: NA# Date: 19/08/2023# Exploit Author: Ashutosh Singh Umath# Vendor Homepage: https://phpgurukul.com# Software Link: https://phpgurukul.com/user-registration-login-and-user-management-system-with-admin-panel/# Version: 3.0# Tested on: Windows 11# CVE : RequestedDescriptionUser Registration & Login and User Management System With admin panel 3.0 application from PHPgurukul is vulnerable toPersistent XSS via the fname, lname, email, and contact field name. When User logs in or the admin user logs in the payload gets executed.POCUser side1. Go to the user registration page http://localhost/loginsystem.2. Enter <img src="x" onerror=alert(document.cookie)> in one of thefields (first name, last name, email, or contact).3. Click sign up.Admin side1. Login to admin panel http://localhost/loginsystem/admin.2. After login successfully go to manage user page.3. PayloadThanks and Regards,Ashutosh Singh Umath

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution