Hostel Management System 2.1 Cross Site Scripting

Hostel Management System version 2.1 suffers from multiple cross site scripting vulnerabilities.


MD5 | 620bdf332f1b0bcd48be82a4227ff758

# Exploit Title: PHPGurukul hostel-management-system 2.1 allows XSS via
Guardian Name, Guardian Relation, Guardian Contact no, Address, City
# Google Dork: N/A
# Date: 2020-10-08
# Exploit Author: Kokn3t
# Vendor Homepage: https://phpgurukul.com
# Software Link: https://phpgurukul.com/hostel-management-system
# Version: V 2.1
# Tested on: Windows 10, Kali 2020.1
# CVE : CVE-2020-25270

######## Attack Vector ########

Install Hostel Management System V 2.1

1) User Module

Login as user and go to "Book Hostel"
(http:/localhost/hostel/book-hostel.php) and start booking.

Add malicious script in these fields - "<script>alert('XSS');</script>"

i. Guardian Name

ii. Guardian Relation

iii.Guardian Contact no

iv. Address

vi. City

After that will get a prompt "Student Successfully register" and after
pressing "See All", XSS will be triggered.

2) Admin Module

Login in as Admin and go to "Management Students", and "View Full details"
of booked student's record, XSS will be triggered also.

Related Posts