FirstBlood-#1710 — Stored xss in doctors photo on meet drs.php
This issue was discovered on FirstBlood v3
On 2022-12-14, didsec Level 5 reported:
I have discovered a stored XSS vulnerability affecting the doctors photo on meet_drs.php
Payload
/x" onerror=alert(document.domain) xss="
To reproduce:
- Login to the
drpanel
and pick a doctor to modify
- Make any modifications you would like
- Click
Save information
and intercept the request
- Add
&photoUrl=/x" onerror=alert(document.domain) xss="
to the data and forward the request
- Visit
firstbloodhackers.com/meet_drs.php
and the xss will execute
Impact:
- The attacker could steal a user's cookies.
- The attacker can steal data from whoever views the page.
- Users can execute arbitrary JavaScript code in the context of other users.
P2 High
FirstBlood ID: 64
Vulnerability Type: Stored XSS
There is a stored XSS vulnerability on meet_drs.php from the photo of the doctor