CVE-2023-37687

7.2 HIGH

📋 TL;DR

Online Nurse Hiring System v1.0 contains a stored cross-site scripting (XSS) vulnerability in the Admin portal's View Request of Nurse Page. This allows attackers to inject malicious scripts that execute when administrators view nurse requests, potentially compromising admin sessions and system integrity. Only systems running this specific software version are affected.

💻 Affected Systems

Products:
  • Online Nurse Hiring System
Versions: v1.0
Operating Systems: Any OS running PHP web applications
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Admin portal's View Request of Nurse Page functionality. Requires attacker access to submit malicious nurse requests or modify existing ones.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal admin session cookies, gain full administrative access, pivot to other systems, install backdoors, or exfiltrate sensitive nurse and patient data.

🟠

Likely Case

Attackers would steal admin credentials, modify system data, create unauthorized accounts, or redirect users to malicious sites.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability would be neutralized, preventing script execution while maintaining functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to create or modify nurse requests, which typically requires some level of access. The vulnerability is in the view/display functionality rather than input submission.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Implement proper input validation on all nurse request fields. 2. Apply output encoding when displaying nurse request data. 3. Sanitize all user-controlled data before rendering in HTML context.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to reject or sanitize HTML/script content in nurse request fields

Implement PHP filter: htmlspecialchars($input, ENT_QUOTES, 'UTF-8') for all displayed fields

Content Security Policy

all

Implement CSP headers to restrict script execution sources

Header set Content-Security-Policy "default-src 'self'; script-src 'self'" in .htaccess or server config

🧯 If You Can't Patch

  • Restrict access to Admin portal using network segmentation and IP whitelisting
  • Implement web application firewall (WAF) rules to block XSS payloads in nurse request parameters

🔍 How to Verify

Check if Vulnerable:

Test by submitting nurse requests containing <script>alert('XSS')</script> in fields, then check if script executes when viewing in Admin portal

Check Version:

Check application version in admin panel or readme files; system is vulnerable if version is exactly 1.0

Verify Fix Applied:

Repeat XSS test payloads; scripts should be displayed as plain text or sanitized, not executed

📡 Detection & Monitoring

Log Indicators:

  • Unusual nurse request submissions with script tags or JavaScript code
  • Multiple failed login attempts to admin portal following nurse request submissions

Network Indicators:

  • Outbound connections to suspicious domains from admin workstations
  • Unusual traffic patterns to nurse request submission endpoints

SIEM Query:

source="web_logs" AND (uri="/admin/view-nurse-request" OR uri="/submit-nurse-request") AND (message="*<script>*" OR message="*javascript:*")

🔗 References

📤 Share & Export