A vulnerability was found in CodeAstro Hospital Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /backend/admin/his_admin_add_vendor.php of the component Add Vendor Details Page. The manipulation of the argument v_name/v_adr/v_number/v_email/v_phone/v_desc leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://vuldb.com/?id.286017 | vdb entry permissions required technical description |
https://vuldb.com/?ctiid.286017 | signature permissions required |
https://github.com/EmilGallajov/zero-day/blob/main/codeastro_hms_stored_xss.md | mitigation third party advisory exploit |
https://www.youtube.com/watch?v=UsScmd8Xzuw | media coverage exploit |
https://codeastro.com/ | product |