[*] :: Title: Bayanno Hospital Management System v4.2 Stored XSS Injection
[*] :: Author: QUIXSS
[*] :: Date: 2019-04-23
[*] :: Software: Bayanno Hospital Management System v4.2
[?] :: Technical Details & Description:
# Weak security measures like no input fields data filtering has been discovered in the «Bayanno Hospital Management System». Current version of this web-application is 4.2.
[?] :: Demo Website:
# https://codecanyon.net/item/bayanno-hospital-management-system/5814621
# Frontend: http://creativeitem.com/demo/bayanno/
# Backend: http://creativeitem.com/demo/bayanno/index.php/login
# Login: admin@example.com, Password: 1234
[!] :: PoC Payload:
# "><script>alert('QUIXSS')</script>
# http://creativeitem.com/demo/bayanno/index.php/admin/dashboard
[+] :: PoC [Stored XSS Injection]:
# Authorize on the demo website for tests: http://creativeitem.com/demo/bayanno/index.php/login (login / password is admin@example.com / 1234). Then go to the settings page: http://creativeitem.com/demo/bayanno/index.php/admin/system_settings and save your payload in the «System Name» and/or «System Title» input fields.
# Almost each input field is vulnerable for Stored XSS Injection.