Curfew e-Pass Management version 1.0 suffers from a persistent cross site scripting vulnerability.
c64820cce6dc87b5f5f5e413a2648f854c0d9a0562aad97588eb6530c3275a51
# Exploit Title: Stored XSS in Curfew e-Pass Management
# Date: 2/1/2021
# Exploit Author: Arnav Tripathy
# Vendor Homepage: https://phpgurukul.com
# Software Link:
https://phpgurukul.com/curfew-e-pass-management-system-using-php-and-mysql/
# Version: 1.0
# Tested on: Windows 10/Wamp
1)Log into the application
2)Click on pass then click add a pass
3) Put <script>alert(1)</script> in the Full name parameter , rest all fill
whatever you want.
4)Now go to manage passes, view the pass you just created.
5)You'll get popup of alert
6)It is persistent , so it's a stored xss.