Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Royal Event Management System - Stored Cross-Site Scripting

By kannthu

High
Vidoc logoVidoc Module
#xss#unauthenticated#cms#royalevent#packetstorm
Description

What is the "Royal Event Management System - Stored Cross-Site Scripting?"

The "Royal Event Management System - Stored Cross-Site Scripting" module is designed to detect a stored cross-site scripting vulnerability in the Royal Event Management System. This vulnerability allows an attacker to execute arbitrary scripts in the browser of an unsuspecting user. The severity of this vulnerability is classified as high.

This module was authored by ritikchaddha.

Impact

A successful exploitation of the stored cross-site scripting vulnerability in the Royal Event Management System can lead to various consequences, including:

- Execution of arbitrary scripts in the browser of an unsuspecting user - Potential theft of sensitive user information - Possible manipulation of website content - Compromise of user accounts

How the module works?

The "Royal Event Management System - Stored Cross-Site Scripting" module works by sending a specific HTTP request to the target system and then matching the response against predefined conditions. If the conditions are met, the module reports the vulnerability.

Here is an example of the HTTP request used by the module:

POST /royal_event/companyprofile.php HTTP/1.1
Host: <Hostname>

companyname=><script>alert(document.domain)</script>&regno=test&companyaddress=&companyemail=&country=India&mobilenumber=1234567899&submit=

The module includes the following matching conditions:

- A matcher that checks if the response contains the string value="><script>alert(document.domain)</script>"> - A matcher that checks if the response status is 302 (Found)

If both matching conditions are met, the module reports the presence of the stored cross-site scripting vulnerability in the Royal Event Management System.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Raw request
Matching conditions
word: value="><script>alert(document.domain)</...and
status: 302
Passive global matcher
No matching conditions.
On match action
Report vulnerability