CVE-2023-6425

6.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to inject malicious JavaScript into the BigProf Online Clinic Management System through the FirstRecord parameter in medical_records_view.php. The stored XSS payload executes when legitimate users view the compromised page, potentially stealing session cookies or performing unauthorized actions. All users of BigProf Online Clinic Management System version 2.2 are affected.

💻 Affected Systems

Products:
  • BigProf Online Clinic Management System
Versions: 2.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires no special configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, data theft, and unauthorized administrative actions through session hijacking or malicious JavaScript execution.

🟠

Likely Case

Session hijacking leading to unauthorized access to patient medical records and clinic management functions.

🟢

If Mitigated

Limited impact with proper input validation and output encoding preventing payload execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward with publicly available proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement proper input validation and output encoding for the FirstRecord parameter in medical_records_view.php

Edit /clinic/medical_records_view.php to sanitize FirstRecord parameter using htmlspecialchars() or similar functions

Web Application Firewall (WAF) Rules

all

Deploy WAF rules to block XSS payloads targeting the FirstRecord parameter

Configure WAF to block requests containing script tags or JavaScript in FirstRecord parameter

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution
  • Restrict access to medical_records_view.php to authorized users only and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Test by submitting a payload like <script>alert('XSS')</script> in the FirstRecord parameter and check if it executes when viewing the page.

Check Version:

Check system version in administration panel or configuration files

Verify Fix Applied:

Verify that submitted payloads are properly encoded and do not execute when viewing the page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /clinic/medical_records_view.php with script tags or JavaScript in parameters
  • Multiple failed login attempts followed by successful access to medical records

Network Indicators:

  • HTTP requests containing script tags or JavaScript payloads in FirstRecord parameter

SIEM Query:

source="web_server" AND (uri="/clinic/medical_records_view.php" AND (param="FirstRecord" AND value MATCHES "<script.*>.*</script>" OR value MATCHES "javascript:"))

🔗 References

📤 Share & Export