# Exploit Title: Hospitals Patient Records Management System 1.0 - 'doctors' Stored Cross Site Scripting (XSS) # Exploit Author: (Sant268) # Vendor Homepage: https://www.sourcecodester.com/ # Software Link: https://www.sourcecodester.com/php/15116/hospitals-patient-records-management-system-php-free-source-code.html # Version: HPRMS 1.0 # Tested on: Ubuntu 20, Apache - Description: A Stored XSS issue in HPRMS v.1.0 allows remote attackers to inject JavaScript via /articles in the description parameter. - Payload used: - Steps to reproduce: 1- Go to http://victim.com/admin/?page=doctors 2- Add a Doctor, paste the payload in specialization 3- Alert will pop whenever the page is accessed. ---- # Exploit Title: Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS) # Exploit Author: (Sant268) # Vendor Homepage: https://www.sourcecodester.com/ # Software Link: https://www.sourcecodester.com/php/15116/hospitals-patient-records-management-system-php-free-source-code.html # Version: HPRMS 1.0 # Tested on: Ubuntu 20, Apache - Description: A XSS issue in HPRMS v.1.0 allows remote attackers to inject JavaScript via /articles in the description parameter. - Payload used: - Steps to reproduce: 1- Go to http://victim.com/admin/?page=room_list 2- Add Room type, paste the payload in description 3- Alert will pop whenever the page is accessed. ---- # Exploit Title: Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS) # Exploit Author: (Sant268) # Vendor Homepage: https://www.sourcecodester.com/ # Software Link: https://www.sourcecodester.com/php/15116/hospitals-patient-records-management-system-php-free-source-code.html # Version: HPRMS 1.0 # Tested on: Ubuntu 20, Apache - Description: A XSS issue in HPRMS v.1.0 allows remote attackers to inject JavaScript via /articles in the description parameter. - Payload used: - Steps to reproduce: 1- Go to http://victim.com/admin/?page=room_types 2- Add Room type, paste the payload in description 3- Alert will pop whenever the page is accessed.