# Exploit Title: Complaint Management System 4.2 - Persistent Cross-Site Scripting  
# Author: Besim ALTINOK  
# Vendor Homepage:  
# Software Link:  
# Version: v4.2  
# Tested on: Xampp  
# Credit: İsmail BOZKURT  
------ Details:  
1- Vulnerable code is here: http://localhost/cms/users/registration.php  
2- Vulnerable code:  
Insert user registration information to the DB without filtering.  
$query=mysqli_query($con,"insert into  
$msg="Registration successfull. Now You can login !";  
3- In the admin dashboard:  
Get fullName from DB and print it without any filtering  
<td colspan="2"><b><?php echo $row['fullName'];?>'s profile</b></td>  
4- If we insert "fullName" as "script>prompt(2)</script>", we can perform  
this attack as "Stored XSS"  
5- Picture in the Attachemnt