CyberXtron
CVE-2024-37798 - Cross-Site Scripting (XSS) in Beauty Parlour Management System
CVE-2024-37798CVEXSS

CVE-2024-37798 - Cross-Site Scripting (XSS) in Beauty Parlour Management System

Title: CVE-2024-37798 - Cross-Site Scripting (XSS) in Beauty Parlour Management System

CVE_ID: CVE-2024-37798  Vendor: Phpgurukul  Affected Product:  Beauty Parlour Management System   Affected Version/s: 1.0  Status: Pending Fix  

Description: A newly discovered Cross-Site Scripting (XSS) vulnerability has been identified in the BPMS Admin Panel, specifically in the `search-appointment.php` endpoint. This vulnerability allows attackers to execute arbitrary JavaScript in the context of the user's browser, potentially leading to various malicious activities.

Proof of Concept (POC):

Target URL: `http://localhost/bpms/admin/search-appointment.php`

XSS Payload: <script>alert(1)</script>

Screenshots:

Fig 1: Injecting Payload into the Beauty Parlour Management System Admin Panel

Fig 2

Steps to Reproduce:

  1. Navigate to the BPMS Admin Panel.
  2. Go to the search-appointment.php endpoint: http://localhost/bpms/admin/search-appointment.php.
  3. In the search input field, enter the XSS payload: <script>alert(1)</script>
  4. Submit the search form. Observe that an alert box displaying "1" is triggered, indicating the execution of the injected JavaScript code.

Impact:

If exploited, this XSS vulnerability can lead to:

- Unauthorized execution of scripts in the user's browser.

- Theft of sensitive information such as session cookies, which could lead to account hijacking.

- Redirection to malicious websites.

- Display of phishing content or other forms of social engineering attacks.

Remediations:

- Patch Availability: Currently, there is no official patch available. Users should check with the BPMS vendor for updates.

- Workarounds:

  - Apply input validation and sanitization on all user inputs.

  - Encode output to ensure that any data rendered in the browser is treated as text rather than executable code.

  - Implement Content Security Policy (CSP) to limit the sources from which scripts can be executed.

- Best Practices:

  - Regularly update and patch software.

  - Use frameworks and libraries that automatically escape data to prevent XSS.

  - Monitor and log unusual activities to detect and respond to potential attacks promptly.

 

Uncover hidden weaknesses before attackers do: Our elite Offensive Security Research Team relentlessly identifies and reports vulnerabilities in critical applications. Subscribe to our solutions and leverage this expertise to proactively fortify your defenses against ever-evolving cyber threats.

Explore our solutions on [https://cyberxtron.com/] or contact our support team at support@cyberxtron.com.

Elevate your security—get curated threat insights in your inbox.

CVE-2024-37798 - Cross-Site Scripting (XSS) in Beauty Parlour Management System | CyberXTron Blog