XSS vulnerability from phpgurukul Vehicle Record System 1.0 (edit-brand.php)

CVE-2024-10414

A vulnerability has been found in PHPGurukul Vehicle Record System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/edit-brand.php. The manipulation of the argument Brand Name leads to cross site scripting. This vulnerability was named CVE-2024-10414. The attack can be initiated remotely. Furthermore, there is an exploit available. The initial researcher advisory mentions the parameter “phone_number” to be affected. But this might be a mistake because the textbox field label is “Brand Name”.

Affected Project: Vehicle Record System 1.0

Official Website: https://phpgurukul.com/vehicle-record-system-using-php-and-mysql/

Version: 1.0

Related Code file: edit-brand.php

Vulnerability Description

/admin/edit-brand.php is vulnerable to the tested XSS payload: %3cIMG%20%22%22%22%3e%3cSCRIPT%3ealert(%22XSS%22)%3c%2fSCRIPT%3e%22%3e. This string is encoded and when decoded, it attempts to inject a script into the webpage: <IMG """"><SCRIPT>alert("XSS")</SCRIPT>">

Application does not properly sanitize or validate the phone_number input, this script could be executed in the user’s browser, leading to an XSS attack.

Demonstration

Below is how edit-brand.php looks like:

Screenshot from 2024-10-25 23-13-31

Let’s fill in some XSS payloads to it:

Screenshot from 2024-10-25 23-13-41

After submitting the change, XSS is triggered:

Screenshot from 2024-10-25 23-13-11